Thu.Nov 24, 2022

article thumbnail

14 PCI Compliance security best practices for your business

Tech Republic Security

Looking for more information on PCI Compliance security? Read 14 security best practices for PCI (Payment Card Industry) Compliance with our guide. The post 14 PCI Compliance security best practices for your business appeared first on TechRepublic.

204
204
article thumbnail

DUCKTAIL malware campaign targeting Facebook business and ads accounts is back

CSO Magazine

A group of attackers, likely based in Vietnam, that specializes in targeting employees with potential access to Facebook business and ads management accounts, has re-emerged with changes to its infrastructure, malware, and modus operandi after being initially outed a few months ago. Dubbed DUCKTAIL by researchers from WithSecure, the group uses spear phishing to target individuals on LinkedIn who have job descriptions that could suggest they have access to manage Facebook business accounts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

14 PCI compliance security best practices for your business

Tech Republic Security

Looking for more information on PCI Compliance security? Read 14 security best practices for PCI (Payment Card Industry) Compliance with our guide. The post 14 PCI compliance security best practices for your business appeared first on TechRepublic.

148
148
article thumbnail

487 Million WhatsApp Users Mobile Numbers for Sale on Hacking Forum

Heimadal Security

On November 16th an unknown threat actor announced that he was selling a database of almost 500 million mobile phone numbers belonging to WhatsApp users. The sales ad was found on a notorious hacking community forum and claimed it had fresh data, not older than 2022, from millions of people around the globe. Right now, […]. The post 487 Million WhatsApp Users Mobile Numbers for Sale on Hacking Forum appeared first on Heimdal Security Blog.

Mobile 124
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Ransomware attack on Indian AIIMS Hospital

CyberSecurity Insiders

AIIMS Delhi, one of the renowned hospitals of the world, lost access to digital infrastructure because of a ransomware attack that occurred in the early hours of Wednesday this week. And information is out that doctors lost access to medical records resulting in severe chaos in treating the patients. The incident came into light today when another Indian news daily Times of India made the cyber attack details public.

article thumbnail

$1200 for acceleration on a Merc

Javvad Malik

Mercedes is one of the latest car companies to think, “hey, what do we do in a global downturn when new sales are low… I know, let’s limit some features on our car, then when people buy them, charge them extra to unlock it via a subscription model. If it’s worked for SaaS, it can work for us!” According to their site , a mere $1200 a month can give you a “noticeable improvement in acceleration of 0.8 to 1.0 seconds (0-60MPH)” I kind of get it when car ma

LifeWorks

More Trending

article thumbnail

How to Avoid Black Friday Scams Online

WIRED Threat Level

'Tis the season for swindlers and hackers. Use these tips to spot frauds and keep your payment info secure.

Scams 105
article thumbnail

How To Fix iPhone Overheating Problem: 6 Easy Steps

SecureBlitz

Here, I will show you how to fix iPhone overheating problem in 6 easy steps. One of the key issues with modern smartphones is never having enough storage space. The newest iPhones do come with vast storage spaces, but for now, let’s look at how to clear some space on an iPhone for the power […]. The post How To Fix iPhone Overheating Problem: 6 Easy Steps appeared first on SecureBlitz Cybersecurity.

article thumbnail

Details on Interpol seizing $130m from cyber criminals and details on Pig Butchering

CyberSecurity Insiders

INTERPOL has announced that its cyber operation codenamed “Haechi III” has turned into an immense success as the law enforcement agency seized $130,000,000 worth money and virtual assets from cyber criminals and money laundering scams and succeeded in arresting over 1000 of suspects. According to a press update released by the ‘International Crime Police Organization’, most of the amount seized was related to romance scams, phishing, se$tortion, investment frauds, cryptocurrency scams and money

Scams 104
article thumbnail

RansomExx Ransomware upgrades to Rust programming language

Security Affairs

RansomExx ransomware is the last ransomware in order of time to have a version totally written in the Rust programming language. The operators of the RansomExx ransomware (aka Defray777 and Ransom X) have developed a new variant of their malware, tracked as RansomExx2, that was ported into the Rust programming language. The move follows the decision of other ransomware gangs, like Hive , Blackcat , and Luna , of rewriting their ransomware into Rust programming language.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

10 tips to avoid Black Friday and Cyber Monday scams

We Live Security

It pays not to let your guard down during the shopping bonanza – watch out for some of the most common scams doing the rounds this holiday shopping season. The post 10 tips to avoid Black Friday and Cyber Monday scams appeared first on WeLiveSecurity.

Scams 98
article thumbnail

Threat actors exploit discontinues Boa web servers to target critical infrastructure

Security Affairs

Microsoft reported that hackers have exploited flaws in a now-discontinued web server called Boa in attacks against critical industries. Microsoft experts believe that threat actors behind a malicious campaign aimed at Indian critical infrastructure earlier this year have exploited security flaws in a now-discontinued web server called Boa. The Boa web server is widely used across a variety of devices, including IoT devices, and is often used to access settings and management consoles as well as

IoT 98
article thumbnail

Meta Takes Down Clusters of Fake Accounts Associated with the U.S Military

Heimadal Security

Earlier this week, Meta published a threat report with their findings on three networks they took down in the U.S., China, and Russia. The former was linked to individuals associated with the US military – the accounts on Facebook and Instagram were being used in covert influence campaigns targeting Russia and the Middle East. We […]. The post Meta Takes Down Clusters of Fake Accounts Associated with the U.S Military appeared first on Heimdal Security Blog.

article thumbnail

UK urges to disconnect Chinese security cameras in government buildings

Security Affairs

The British government banned the installation of Chinese-linked security cameras at sensitive facilities due to security risks. Reuters reports that the British government ordered its departments to stop installing Chinese security cameras at sensitive buildings due to security risks. The Government has ordered departments to disconnect the camera from core networks and to consider removing them. “The decision comes after a review of “current and future possible security risks assoc

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The Anatomy of PTaaS: What Is Penetration Testing as a Service

Heimadal Security

In this article, we’ll go over what penetration testing as a service is and how it works. You’ll also learn about the different types of services and the difference between penetration testing and vulnerability assessment, and much more! So let’s jump right into it! Penetration Testing as a Service (PTaaS) is an innovative service for […].

article thumbnail

An aggressive malware campaign targets US-based companies with Qakbot to deliver Black Basta Ransomware

Security Affairs

Researchers warn of an ongoing aggressive Qakbot malware campaign that leads to Black Basta ransomware infections in the US. Experts at the Cybereason Global SOC (GSOC) team have observed a surge in Qakbot infections as part of an ongoing aggressive Qakbot malware campaign that leads to Black Basta ransomware infections in the US. In the last two weeks, the experts observed attacks against more than 10 different US-based customers.

article thumbnail

Putting the Brakes on Connected Car Privacy and Security Risks

Security Boulevard

Data runs the world. Estimates suggest 97 zettabytes will be created in 2022 alone; equivalent to 97 billion TBs. But while corporate IT bosses and regulators are waking up to the reality of the cyber risks this poses, few consider the connected car to be a potential driver of data security threats. They are wrong to do so. In fact, data is being produced by increasingly tech-centric vehicles at a prodigious rate, raising concerns about where it is being shared – and how securely.

Risk 98
article thumbnail

I Lost $17,000 in Crypto. Here’s How to Avoid My Mistake

WIRED Threat Level

I’m not the first person to suffer this fate, but hopefully I can be the last.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Mali GPU ‘Patch Gap’ Leaves Android Users Vulnerable To Attacks

Heimadal Security

Millions of Android devices are still vulnerable to a security risk due to five exploitable flaws in Arm’s Mali GPU driver, even though the vendor patched them months ago. As you can see from this list of vulnerable Google devices, there are many famous names, including ones made by Google and Samsung. Although a security fix […]. The post Mali GPU ‘Patch Gap’ Leaves Android Users Vulnerable To Attacks appeared first on Heimdal Security Blog.

Risk 98
article thumbnail

Millions of Android Devices Still Don't Have Patches for Mali GPU Flaws

The Hacker News

A set of five medium-severity security flaws in Arm's Mali GPU driver has continued to remain unpatched on Android devices for months, despite fixes released by the chipmaker. Google Project Zero, which discovered and reported the bugs, said Arm addressed the shortcomings in July and August 2022.

97
article thumbnail

The Ducktail Malware Operation Gains New Capabilities

Heimadal Security

The operators of the Ducktail information stealer demonstrate once again a willingness to persist, as they have updated their malware to use in an ongoing financially driven campaign. Cybersecurity researchers say that the malware is used to steal browser cookies and take advantage of Facebook sessions to steal information from victims’ accounts. Ultimately, the purpose […].

Malware 97
article thumbnail

New RansomExx Ransomware Variant Rewritten in the Rust Programming Language

The Hacker News

The operators of the RansomExx ransomware have become the latest to develop a new variant fully rewritten in the Rust programming language, following other strains like BlackCat, Hive, and Luna.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Black Basta Ransomware Gang Infiltrates U.S. Companies via Qakbot Malware

Heimadal Security

Affiliates of Black Basta gang are notorious for employing the banking trojan known as QakBot for initial access and almost immediately deploy ransomware in IT systems belonging to worldwide organizations. However, researchers concluded that U.S. companies have been targeted by a more aggressive campaign that leads to Black Basta ransomware infections on compromised networks.

article thumbnail

Hackers modify popular OpenVPN Android app to include spyware

Bleeping Computer

A threat actor associated with cyberespionage operations since at least 2017 has been luring victims with fake VPN software for Android that is a trojanized version of legitimate software SoftVPN and OpenVPN. [.].

Spyware 96
article thumbnail

Interpol Seized $130 Million from Cybercriminals in Global "HAECHI-III" Crackdown Operation

The Hacker News

Interpol on Thursday announced the seizure of $130 million worth of virtual assets in connection with a global crackdown on cyber-enabled financial crimes and money laundering. The international police operation, dubbed HAECHI-III, transpired between June 28 and November 23, 2022, resulting in the arrests of 975 individuals and the closure of more than 1,600 cases.

95
article thumbnail

Docker Hub repositories hide over 1,650 malicious containers

Bleeping Computer

Over 1,600 publicly available Docker Hub images hide malicious behavior, including cryptocurrency miners, embedded secrets that can be used as backdoors, DNS hijackers, and website redirectors. [.].

DNS 94
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

U.K. Police Arrest 142 in Global Crackdown on 'iSpoof' Phone Spoofing Service

The Hacker News

A coordinated law enforcement effort has dismantled an online phone number spoofing service called iSpoof and arrested 142 individuals linked to the operation. The websites, ispoof[.]me and ispoof[.]cc, allowed the crooks to "impersonate trusted corporations or contacts to access sensitive information from victims," Europol said in a press statement.

93
article thumbnail

Google pushes emergency Chrome update to fix 8th zero-day in 2022

Bleeping Computer

Google has released an emergency security update for the desktop version of the Chrome web browser, addressing the eighth zero-day vulnerability exploited in attacks this year. [.].

93
article thumbnail

EPSS explained: How does it compare to CVSS?

CSO Magazine

The Common Vulnerability Scanning System (CVSS) is the most frequently cited rating system to assess the severity of security vulnerabilities. It has been criticized , however, as not being appropriate to assess and prioritize risk from those vulnerabilities. For this reason, some have called for using the Exploit Prediction Scoring System (EPSS) or combining CVSS and EPSS to make vulnerability metrics more actionable and efficient.

article thumbnail

EU Parliament Site Attacked by Russian Hacktivists

Heimadal Security

The European Parliament’s official website was taken down for hours on Wednesday, November 23, by a DDoS attack. The attack was claimed by Anonymous Russia, part of the pro-Russian hacktivist group, Killnet. Details About the Attack The DDoS (Distributed Denial of Service) attack was confirmed by the European Parliament President, Roberta Metsola, who said: “IT […].

DDOS 90
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!