Mon.Mar 22, 2021

article thumbnail

Details of a Computer Banking Scam

Schneier on Security

This is a longish video that describes a profitable computer banking scam that’s run out of call centers in places like India. There’s a lot of fluff about glitterbombs and the like, but the details are interesting. The scammers convince the victims to give them remote access to their computers, and then that they’ve mistyped a dollar amount and have received a large refund that they didn’t deserve.

Banking 334
article thumbnail

Cloudflare introduces SD-WAN- and firewall-as-a-service offerings

Tech Republic Security

In a bid to replace MPLS circuits and SD-WAN appliances, Cloudflare has introduced Magic WAN and Magic Firewall and partnerships with VMware, Aruba, Digital Realty, CoreSite and EdgeConneX.

Firewall 169
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 reasons why (not only) financial companies struggle with cybersecurity

We Live Security

Why do many organizations have a hard time keeping up with the evolving threat landscape and effectively managing their cyber-risks? The post 5 reasons why (not only) financial companies struggle with cybersecurity appeared first on WeLiveSecurity.

article thumbnail

7 expert tips on recruiting cybersecurity pros

Tech Republic Security

HR and recruiting experts offer unique ways to find and hire cybersecurity talent.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Energy giant Shell discloses data breach after Accellion hack

Bleeping Computer

Energy giant Shell has disclosed a data breach after attackers compromised the company's secure file-sharing system powered by Accellion's File Transfer Appliance (FTA). [.].

article thumbnail

Leveraging Managed Threat Hunting

Security Boulevard

The cybersecurity landscape changed drastically on two fronts in 2020: volume and supply chain complexities. Attack surfaces expanded and softened as employees migrated off well-protected corporate networks and logged on from home. As a result, the number of incidents and the money cybercriminals made from exploits like ransomware skyrocketed, growing 311% to $350M.

More Trending

article thumbnail

Taking a Security-First Approach to Cloud Migration

Security Boulevard

The pandemic and lockdowns hit their first anniversary mark, and many companies continue to have their employees work from home for the foreseeable future. Over the past year, organizations have seen how important cloud computing is to business operations. In fact, according to a MariaDB survey, 40% of respondents said that COVID-19 accelerated their migration.

article thumbnail

‘The race is on’: CISA raises alarm bells about ransomware attacks against Microsoft Exchange servers

SC Magazine

Brandon Wales, acting executive director of the Cybersecurity and Infrastructure Security Agency, issued both a warning and a hopeful message Monday to organizations struggling with the scourge of ransomware. The warning: “the race is on” between government, industry and an increasingly professionalized criminal underground to identify digital weaknesses that can be leveraged in ransomware campaigns, like the vulnerabilities identified in Microsoft Exchange servers.

article thumbnail

Microsoft Exchange servers now targeted by BlackKingdom ransomware

Bleeping Computer

Another ransomware operation known as 'BlackKingdom' is exploiting the Microsoft Exchange Server ProxyLogon vulnerabilities to encrypt servers. [.].

article thumbnail

SoloKeys Solo V2 is an easy and quick way to improve your personal cybersecurity

Tech Republic Security

The security key is built on open source hardware and firmware, making it a universal factor authentication device instead of a two-factor authentication device.

Firmware 126
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Microsoft releases printer fix for older Windows Versions

Bleeping Computer

Microsoft has released out-of-band emergency updates for Windows 7, 8.1, Windows Server 2008, and Windows Server 2012 to fix printer issues arising from the March 2021 Patch Tuesday updates. [.].

138
138
article thumbnail

Which is the Threat landscape for the ICS sector in 2020?

Security Affairs

The Kaspersky ICS CERT published a report that provided details about the threat landscape for computers in the ICS engineering and integration sector in 2020. Kaspersky ICS CERT published a report that provided details about the threat landscape for ICS engineering and integration sector in 2020. The experts gathered data related to the cyberthreats that were blocked on computers used to manage industrial control equipment and targeting software used in ICS engineering and integration industry,

article thumbnail

Microsoft 365 Spoofing Campaign Targets CEOs and Decision Makers, Research Finds

Hot for Security

Security researchers have identified a new Microsoft 365 spoofing campaign that targets specific people in companies, trying to compromise peoples’ accounts such as C-suite executives and other essential positions from the retail, insurance and financial services industries. Sweeping spoofingcampaigns are an almost everyday occurrence, as companies have to deal with this threat constantly.

Phishing 128
article thumbnail

Microsoft shares workaround for 0xc004c003 Windows 10 activation errors

Bleeping Computer

Microsoft has shared a workaround for customers experiencing 0xc004c003 activation failures on Windows 10, version 2004 and 20H2 devices after installing the January 2021 monthly "C" release KB4598291 preview update. [.].

139
139
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Cloudflare wants to be your corporate network backbone with centralized management and security

CSO Magazine

Cloudflare has added two new major features to its Cloudflare One network-as-a-service platform. Magic WAN allows organizations to connect their branch offices, data centers, cloud assets, and remote workers to its global network and use it as their own software-defined WAN. Magic Firewall is a firewall-as-a-service that allows organizations to enforce security policies on this new virtual network. [ Follow these 5 tips for better cloud security. | Get the latest from CSO by signing up for our n

CSO 125
article thumbnail

Report goes “behind enemy lines” to reveal SilverFish cyber-espionage group

Malwarebytes

The PRODAFT Threat Intelligence Team has published a report (pdf) that gives an unusually clear look at the size and structure of organized cybercrime. It uncovered a global cybercrime campaign that uses modern management methods, sophisticated tools—including its own malware testing sandbox—and has strong ties with the SolarWinds attack, the EvilCorp group, and some other well-known malware campaigns.

article thumbnail

DDoS attacks and 5G: everything you need to know

Security Boulevard

Cybersecurity geeks may already know this historical tidbit… The first DDoS attack occurred back in 1999, when a computer at the University of Minnesota suddenly came under attack from a network of 114 other computers infected with a malicious script called Trin00. What they may not know, or remember, is that, earlier that same year, The post DDoS attacks and 5G: everything you need to know appeared first on Allot Blog.

DDOS 126
article thumbnail

Microsoft Exchange servers now targeted by Black Kingdom ransomware

Bleeping Computer

Another ransomware operation known as 'Black Kingdom' is exploiting the Microsoft Exchange Server ProxyLogon vulnerabilities to encrypt servers. [.].

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Ministry of Defence academy hit by state-sponsored hackers

Security Affairs

The Ministry of Defence academy was hit by a major cyber attack, Russia and China state-sponsored hackers are suspected to be behind the offensive. The Ministry of Defence academy was hit by a major cyber attack, according to the British tabloid newspaper The Sun, Russia and China state-sponsored hackers are suspected to be behind the offensive. The Defence Academy of the United Kingdom provides higher education for personnel in the British Armed Forces, Civil Service, other government departmen

article thumbnail

Mozilla Firefox adopts new privacy-enhancing Referrer Policy

Bleeping Computer

Mozilla has announced that it will introduce a more privacy-focused Referrer Policy to protect the privacy of Firefox users starting with the web browser's next version. [.].

Software 130
article thumbnail

Popular Netop Remote Learning Software Found Vulnerable to Hacking

The Hacker News

Cybersecurity researchers on Sunday disclosed multiple critical vulnerabilities in remote student monitoring software Netop Vision Pro that a malicious attacker could abuse to execute arbitrary code and take over Windows computers.

Software 120
article thumbnail

Critical code execution vulnerability fixed in Adobe ColdFusion

Bleeping Computer

Adobe has released out-of-band security updates to address a critical vulnerability impacting ColdFusion versions 2021, 2016, and 2018. [.].

139
139
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Critical RCE Vulnerability Found in Apache OFBiz ERP Software—Patch Now

The Hacker News

The Apache Software Foundation on Friday addressed a high severity vulnerability in Apache OFBiz that could have allowed an unauthenticated adversary to remotely seize control of the open-source enterprise resource planning (ERP) system. Tracked as CVE-2021-26295, the flaw affects all versions of the software prior to 17.12.

Software 118
article thumbnail

Websites Hosting Cracks Spread Malware, Adware

Trend Micro

We investigated pay-per-install (PPI) websites spreading multiple malware and adware, including CopperStealer and LNKR.

Adware 144
article thumbnail

SilverFish Hacking Group Abused Enterprise Victims for Sandbox Tests

Heimadal Security

Cyberattackers involved in worldwide hacking campaigns are using the compromised systems of high-profile victims as playgrounds to test out malicious tool detection rates. SilverFish is an extremely skilled threat group that has been responsible for intrusions at over 4,720 private and government organizations like Fortune 500 companies, ministries, airlines, defense contractors, audit and consultancy companies, […].

Hacking 119
article thumbnail

TrustArc Privacy Risk Summit Highlight: Privacy Law Trends

TrustArc

This month, TrustArc held its third Privacy Risk Summit with over 40 thought-provoking speakers and more than 20 sessions covering numerous privacy topics. The highly-attended session, “Privacy Law Trends: The Bold, the Old, and the Folded,” showcased global privacy trends in what is shaping up to be an interesting 2021. Session panelists included Dr.

Risk 110
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

U.S. Indicts Swiss Hacker Responsible for Security Camera Hack, Data Theft

Digital Guardian

While only 21, the Swiss "hacktivist" has hacked dozens of companies and published data like source code, files, and other proprietary information online.

Hacking 118
article thumbnail

Closing the gender gap in today’s tech industry

Security Boulevard

There’s a history of gender inequality in the workforce, and the tech industry is no exception. Here are four ways to help address it. The post Closing the gender gap in today’s tech industry appeared first on Software Integrity Blog. The post Closing the gender gap in today’s tech industry appeared first on Security Boulevard.

Software 111
article thumbnail

Abusing distance learning software to hack into student PCs

Security Affairs

Experts uncovered critical flaws in the Netop Vision Pro distance learning software used by many schools to control remote learning sessions. McAfee discovered multiple security vulnerabilities in the Netop Vision Pro popular distance learning software which is used by several teachers to control remote learning sessions. . The distance learning software implements multiple features, including viewing student screens, chat functions, and freezing student screens.

Software 110
article thumbnail

Now SolarWinds hacker gets hacked

CyberSecurity Insiders

All these details we have seen many speculations in the media about the SolarWinds hack.But now a new story has emerged in Bloomberg where a Swiss firm claims to hack the hacker who launched the SolarWinds hack. Prodaft, a security firm based in Switzerland is said to have infiltrated the server that was used by the hacker and carried out some intense operation on how the threat actor carried out the operation and how successful he/she/they were till date in their aim, respectively.

Hacking 105
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.