Fri.Jul 30, 2021

article thumbnail

I Am Parting With My Crypto Library

Schneier on Security

The time has come for me to find a new home for my (paper) cryptography library. It’s about 150 linear feet of books, conference proceedings, journals, and monographs — mostly from the 1980s, 1990s, and 2000s. My preference is that it goes to an educational institution, but will consider a corporate or personal home if that’s the only option available.

Education 360
article thumbnail

HTML smuggling is the latest cybercrime tactic you need to worry about

Tech Republic Security

It will be hard to catch these smugglers, as they're abusing an essential element of web browsers that allow them to assemble code at endpoints, bypassing perimeter security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Black Hat insights: Will Axis Security’s ZTNA solution hasten the sunsetting of VPNs, RDP?

The Last Watchdog

Company-supplied virtual private networks (VPNs) leave much to be desired, from a security standpoint. Related: How ‘SASE’ is disrupting cloud security. This has long been the case. Then a global pandemic came along and laid bare just how brittle company VPNs truly are. Criminal hackers recognized the golden opportunity presented by hundreds of millions employees suddenly using a company VPN to work from home and remotely connect to an array of business apps.

VPN 200
article thumbnail

DDoS attacks are down 38.8% in Q2 2021

Tech Republic Security

It's all quiet on the DDoS front, but don't get complacent: The lull is expected, said Kaskersky, and new attack vectors could spell a coming resurgence.

DDOS 198
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to Make Threat Detection Better?

Anton on Security

I keep coming to the same topic over and over? —?why are we still bad at detecting threats? I’ve lamented on this a few times, either touching on general difficulties with detection , its uncertainty or highlighting the fragile detections people write. I also noted the critical role of context in threat detection , which seems to imply that the best detections are written on-site by each team, and not by the vendors in their comfy little labs … Here, I want to continue the conversation on detect

article thumbnail

This ethical hacking course could give your cybersecurity career a boost

Tech Republic Security

Move up in the profitable field of cybersecurity by improving your ethical hacking skills.

Hacking 215

More Trending

article thumbnail

Ransomware risk management: How to start preparing for the future now

Tech Republic Security

TechRepublic's Karen Roby interviews Brandon Vigliarolo about how the ransomware risk management calculus is changing for OT, ICS and critical infrastructure.

Risk 151
article thumbnail

Biden memo, infrastructure deal deliver cybersecurity performance goals and money

CSO Magazine

Both the Biden administration and the Congress continued their frenetic pace this week to beef up the country's digital infrastructure protections through two highly consequential and unprecedented initiatives. Both efforts aim to prepare the nation for the next significant cybersecurity incidents, making up for lost time due to the previous administration's relative inattention to the topic. [ Learn what you need to know about defending critical infrastructure. | Get the latest from CSO by sign

article thumbnail

Cryptomining scams target Android app users

Tech Republic Security

TechRepublic's Karen Roby interviews Lance Whitney about a recent report that detailed how cryptomining scams targeted Android app users and stole an estimated $350,000 from more than 93,000 people.

Scams 141
article thumbnail

DarkTrace Cyber Protects Fashion retailer Ted Baker

CyberSecurity Insiders

Cyber Security firm DarkTrace that uses the technology of Artificial Intelligence to track down cyber threats is nowadays busy protecting the computer network of British Fashion retailer Ted Baker. Britain-based luxury clothing designer & lifestyle service offering company says that DarkTrace has thwarted most of the weekly cyber attacks that include 200 targeted hacks such as spear phishing emails targeting high-level executives and cyber campaigns that help steal critical data from compani

Retail 144
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Cyber-physical attacks: Top 5 things to know

Tech Republic Security

The recent trend of cyberattacks on physical infrastructure is a concern for everyone. Tom Merritt explains with five things we should know.

150
150
article thumbnail

CSO Global Intelligence Report: The State of Cybersecurity in 2021

CSO Magazine

Any lingering indifference to cybersecurity risk has evaporated in the face of spiking ransomware attacks, software supply chain threats , and the challenges of securing remote workers. That’s the clear message of CSO’s Global Intelligence Report: The State of Cybersecurity in 2021, fielded via online survey in May and June of this year. Unsurprisingly, half of those surveyed said they had seen an increase in security incidents at their organizations over the past year.

CSO 144
article thumbnail

Top 5 things to know about cyber-physical attacks

Tech Republic Security

Tom Merritt breaks down the recent trend of cyberattacks on physical infrastructure and how to prevent them.

169
169
article thumbnail

How to thwart phone hackers

CyberSecurity Insiders

Many of you might search for tips that help in keeping phone hackers at bay. So Angus King, the member of secretive Senate Intelligence Committee, is giving advice that could help in keeping a cellphone secure and away from prying eyes. The tip is to switch off the phone and wait for a minute and then turn it on! Well, this might sound naïve to some people.

Spyware 142
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

CVE-2021-3490 – Pwning Linux kernel eBPF on Ubuntu machines

Security Affairs

Researcher published an exploit code for a high-severity privilege escalation flaw (CVE-2021-3490) in Linux kernel eBPF on Ubuntu machines. The security researcher Manfred Paul of the RedRocket CTF team released the exploit code for a high-severity privilege escalation bug, tracked as CVE-2021-3490, in Linux kernel eBPF (Extended Berkeley Packet Filter).

Hacking 141
article thumbnail

Why RaaS Has Become Easier to Launch

Security Boulevard

Straight from the researchers at Intel 471 comes this pro tip for cybersecurity teams inside organizations: Being proactive about what the cybercriminal underground is learning and how it’s behaving can help you pinpoint solutions for your security needs. “What makes it so easy for criminals to launch attacks is a combination of something we see.

article thumbnail

BrandPost: Zero trust’s missing link: application whitelisting

CSO Magazine

From Colonial Pipeline, to JBS (the world’s largest meatpacker), to the recent hack on software company Kaseya, high-profile ransomware attacks are on the rise, with little sign of letting up. These crippling attacks lock access to systems and data and leave victims scrambling to recover and, in some cases, paying the hacker’s ransom with the hope of regaining access to business-critical files and systems.

article thumbnail

Estonian Hacker Steals 300,000 Government ID Photos

Security Boulevard

Estonia’s electronic ID system was hacked last week. Again. A suspect is in custody. The post Estonian Hacker Steals 300,000 Government ID Photos appeared first on Security Boulevard.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

BrandPost: Application whitelisting - an underutilized component of Zero Trust

CSO Magazine

From Colonial Pipeline, to JBS (the world’s largest meatpacker), to the recent hack on software company Kaseya, high-profile ransomware attacks are on the rise, with little sign of letting up. These crippling attacks lock access to systems and data and leave victims scrambling to recover and, in some cases, paying the hacker’s ransom with the hope of regaining access to business-critical files and systems.

article thumbnail

Amazon gets $888 million GDPR fine for behavioral advertising

Bleeping Computer

Amazon has quietly been hit with a record-breaking €746 million fine for alleged GDPR violations regarding how it performs targeted behavioral advertising. [.].

article thumbnail

Amazon penalized 746m Euros over Data Security in UK

CyberSecurity Insiders

Amazon, the American retail giant, has been slapped with a penalty of 746 million Euros($849 USD) for using its consumer data for ad targeting without permission of the populace of Luxembourg—a small European country surrounded by Belgium, France and Germany. Highly placed sources say that the Luxembourg’s National Commission for Data Protection(CNPD) pronounced the fine on July 16th,2021 on the Retailing giant for not complying with the EU General Data Protection Regulation(GDPR).

Retail 138
article thumbnail

Linux eBPF bug gets root privileges on Ubuntu - Exploit released

Bleeping Computer

A security researcher released exploit code for a high-severity vulnerability in Linux kernel eBPF (Extended Berkeley Packet Filter) that can give an attacker increased privileges on Ubuntu machines. [.].

134
134
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

New PayPal Credential Phishing Scam Conducted Via Live Chat Service

Heimadal Security

Recently, Cofense Phishing Defense Center analysts discovered a rather unusual PayPal credential phishing scam. Phishing is a malicious technique used by cybercriminals to gather sensitive information (credit card data, usernames, and passwords, etc.) from users. The attackers pretend to be a trustworthy entity to bait the victims into trusting them and revealing their confidential data. […].

Scams 134
article thumbnail

Week in security with Tony Anscombe

We Live Security

With vacations in full swing, cybercriminals will be looking to scam vacationers looking for that perfect accommodation. Learn to identify these scams. Most people are fans of the convenience provided by online shopping, but some criminals uses this to lure clients into Amazon scams. Learn to detect these. Now that organizations are set to evolve a.

Scams 132
article thumbnail

BrandPost: Lessons in Security: School District Shares Pandemic Experiences

CSO Magazine

The education sector is a top target for cybercriminals, and faces “an unusually large percentage” of social engineering attacks, according to the 2021 Verizon Data Breach Investigations Report. The coronavirus pandemic, which spurred many individuals to study and work remotely, added to the industry’s challenges. For example, the K-12 Cybersecurity Resource Center reported an 18% increase in cyberattacks against schools over the previous year.

article thumbnail

Create a VirtualBox virtual machine backup on a Linux host for security

Tech Republic Security

Jack Wallen teaches you how to use simple bash scripts to automate backing up your VirtualBox VMs.

Backups 157
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Cyberresilience: Your Data Insurance Policy

Security Boulevard

In the wake of the Colonial Pipeline hack, businesses all over the world are getting a very loud reminder that they could be next to be compromised by a ransomware intrusion. For many, it’s not an ‘if,’ but a case of how and when. Even multinational businesses with comprehensive cybersecurity protocols in place are vulnerable. The post Cyberresilience: Your Data Insurance Policy appeared first on Security Boulevard.

Insurance 128
article thumbnail

Fidelis Vulnerability and Trends Report – Q2 2021

CyberSecurity Insiders

At Fidelis Cybersecurity ® , our Threat Research team continuously monitors the current threat landscape to provide coverage and vigilance on the most menacing vulnerabilities. Our Real-Time Vulnerability Alerting Engine harnesses public data and applies proprietary data analytics to cut through the noise and get real-time alerts for highly seismic cloud vulnerability exposures and misconfigurations—making vulnerability fatigue a thing of the past.

article thumbnail

Experts Uncover Several C&C Servers Linked to WellMess Malware

The Hacker News

Cybersecurity researchers on Friday unmasked new command-and-control (C2) infrastructure belonging to the Russian threat actor tracked as APT29, aka Cozy Bear, that has been spotted actively serving WellMess malware as part of an ongoing attack campaign.

Malware 125
article thumbnail

Novel Meteor Wiper Used in Attack that Crippled Iranian Train System

Threatpost

A July 9th attack disrupted service and taunted Iran’s leadership with hacked screens directing customers to call the phone of Iranian Supreme Leader Khamenei with complaints.

Hacking 122
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.