Mon.Aug 22, 2022

article thumbnail

Hyundai Uses Example Keys for Encryption System

Schneier on Security

This is a dumb crypto mistake I had not previously encountered: A developer says it was possible to run their own software on the car infotainment hardware after discovering the vehicle’s manufacturer had secured its system using keys that were not only publicly known but had been lifted from programming examples. […]. “Turns out the [AES] encryption key in that script is the first AES 128-bit CBC example key listed in the NIST document SP800-38A [PDF]” […].

article thumbnail

Black Hat Fireside Chat: Deploying ‘AI’ as a weapon to win the ‘attack surface management’ war

The Last Watchdog

Short-handed cybersecurity teams face a daunting challenge. Related: ‘ASM’ is cybersecurity’s new centerpiece. In an intensely complex, highly dynamic operating environment, they must proactively mitigate myriad vulnerabilities and at the same time curtail the harm wrought by a relentless adversary: criminal hacking collectives. In short, attack surface management has become the main tent pole of cybersecurity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to protect your organization from ransomware-as-a-service attacks

Tech Republic Security

RaaS kits are easy to find on the Dark Web, lowering the barrier of entry so that virtually any cybercriminal can launch successful ransomware attacks, says Microsoft. The post How to protect your organization from ransomware-as-a-service attacks appeared first on TechRepublic.

article thumbnail

Lloyd’s to end insurance coverage for state cyber attacks

Javvad Malik

Lloyds of London has told its members to exclude nation state cyber attacks from insurance policies beginning in 2023, saying they pose unacceptable levels or risk. Hmm so where do we begin to unpack this one? Attribution is never easy, even in the best of times. So who will decide whether an attack is a nation state or just little Timmy trying to impress his friends on the Discord channel?

Insurance 145
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

The Power of You & Becoming Known

Jane Frankland

At The Source, my brand new collaborative and co-creational platform for women in cyber, we’re known for saying, “Be you in the workplace.” But in order to do that, you need to understand and leverage off the power of you. That means getting clear on what you stand for, crafting a message, telling stories, and becoming known. In other words, actively building your personal brand.

CISO 130
article thumbnail

Cookie theft threat: When Multi-Factor authentication is not enough

Tech Republic Security

A lot of companies have deployed multi-factor authentication, yet attackers have some ways to bypass it—the most used one being cookie theft. The post Cookie theft threat: When Multi-Factor authentication is not enough appeared first on TechRepublic.

More Trending

article thumbnail

Paving the Way: Inspiring Women in Payments - A Q&A featuring Viviana Wesley

PCI perspectives

Although Viviana Wesley always knew that she wanted a career in computers and technology, when she first started pursuing it, she realized her strengths were not in coding. But, through the guidance of a friend, she was redirected into IT Support and a new world opened for her; a dynamic world where she could use her technical expertise to help people, which is what she truly wanted to do.

article thumbnail

USB Pen Drives posing as a great cyber threat to IT Infrastructure

CyberSecurity Insiders

USB Pen Drives also called as Removable pen drives are posing as a great cyber threat to IT Infrastructure says research carried out by IBM X-Force and another research carried out by Honeywell Cybersecurity claims that 52% of cyber attacks are targeted at the removable media. In both cases, removable media or USB drives is seen acting as a common threat vector and the issue seems grave as it is posing as a big trouble to industrial control systems.

article thumbnail

3 Benefits of Using Consolidated Platforms in Cybersecurity

Heimadal Security

The need to optimize performance, leverage consistency, and reduce administrative costs has caused a significant percentage of the cybersecurity market to move toward consolidated platforms. Let’s explore what are consolidated platforms in cybersecurity and how they can help businesses have the upper hand in the fight against cybercrime! What Is a Consolidated Platform in Cybersecurity?

article thumbnail

Security Training: Moving on from Nick Burns Through Better Communication

eSecurity Planet

Twenty years ago, Saturday Night Live nailed a tendency in IT to be overly absorbed in tech-speak and to do a poor job of educating users. The Nick Burns: Your Company Computer Guy skits showed rude IT guys belittling users as they fixed their “stupid” problems. A recent experience highlighted that security awareness training and most alerts to users about unsafe practices may be making the error of being too general.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Ransomware spreading Criminals demanding $10m from Paris Hospital

CyberSecurity Insiders

A noted ransomware spreading gang has put forward a $10m proposal before the management of a Paris hospital and is interested in freeing up the data from encryption only when they get the demanded ransom. The CHSF Hospital Centre in Corbeil-Essonne’s, Paris, is the victim that is in discussion and the computer attack is said to have taken place on Saturday night last week.

article thumbnail

How to be Ransomware Ready in Four Steps

Security Boulevard

2021 was a breakout year for ransomware, growing 105% and exceeding 623.3 million attacks, according to SonicWall’s 2022 Cyber Threat Report. Additional research from Sophos showed that ransom payments increased to an average of $812,360 in 2021, while the average cost to remediate an attack was $1.4 million. For nearly all (90%) organizations affected by.

article thumbnail

Hotel and Travel Businesses Attacked by Cybercriminals Using Bogus Reservations

Heimadal Security

The revitalization of the tourism and travel industry in 2022 prompted hackers to target hotel businesses, travel websites, and even tourists. The threat actor dubbed TA558 increased its activity this year, conducting phishing operations against numerous hotels and businesses in the hospitality and travel industry. How Did the Attack Happen? A collection of 15 distinct […].

Phishing 100
article thumbnail

FBI warns of residential proxies used in credential stuffing attacks

Bleeping Computer

The Federal Bureau of Investigation (FBI) warns of a rising trend of cybercriminals using residential proxies to conduct large-scale credential stuffing attacks without being tracked, flagged, or blocked. [.].

99
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

4 Tips to Develop a Human-Layered Cybersecurity Defense

Security Boulevard

Evidence suggests that cybercriminals can infiltrate 93% of all networks, even though organizations plow billions of dollars on cybersecurity each year. This is because most organizational approaches to cybersecurity are still overly centered around beefing up technological controls instead of focusing on the weakest link—human beings. Per Verizon’s 2022 Data Breach Investigation Report, stolen credentials, The post 4 Tips to Develop a Human-Layered Cybersecurity Defense appeared first on Securi

article thumbnail

SpaceX Starlink 'train' of satellites illuminates Northwest skies

Bleeping Computer

Residents of Northwestern parts of the U.S. and Canada were baffled at seeing a bright trail of lights—almost like a train flying through the skies over the weekend. The mystery seems to have now been resolved. And, it's not the aliens. This moving cluster comprises SpaceX's 53 Starlink satellites launched from Florida this Friday. [.].

article thumbnail

Has ESG Become aWake-Up Call for Cybersecurity?

Security Boulevard

Has ESG Become aWake-Up Call for Cybersecurity? Even with ransomware costing billions of dollars in losses and cyber insurance claims, organizations are still impacted beyond the checkbook. Brand imaging, lawsuits, loss of respect in the industry, and mass departures of crucial personnel all stem from people’s perceptions of the organization’s actions during a crisis.

article thumbnail

Meet Borat RAT, a New Unique Triple Threat

The Hacker News

Atlanta-based cyber risk intelligence company, Cyble discovered a new Remote Access Trojan (RAT) malware. What makes this particular RAT malware distinct enough to be named after the comic creation of Sacha Baron Cohen?

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Ecommerce, Digital and Marketing Teams in the Security and Privacy Crosshairs

Security Boulevard

Looking for new tools and partners to enhance user experience, collect visitor analytics, engage prospects and customers through chatbots or advertising, automate information request forms, and process credit cards, among many other functions? Consider the security side of things or it might cost you millions. The post Ecommerce, Digital and Marketing Teams in the Security and Privacy Crosshairs appeared first on Source Defense.

article thumbnail

Misconfigured Meta Pixel exposed healthcare data of 1.3M patients

Bleeping Computer

U.S. healthcare provider Novant Health has disclosed a data breach impacting 1,362,296 individuals who have had their sensitive information mistakenly collected by the Meta Pixel ad tracking script. [.].

article thumbnail

NSO Group Fires CEO — and 100 Staff — in Spyware ‘Streamlining’

Security Boulevard

NSO, notorious producer of the Pegasus nation-state spyware, is struggling. So it’s dumped its CEO, Shalev Hulio, and around 100 employees. The post NSO Group Fires CEO — and 100 Staff — in Spyware ‘Streamlining’ appeared first on Security Boulevard.

Spyware 98
article thumbnail

Escanor Malware delivered in Weaponized Microsoft Office Documents

Security Affairs

Researchers spotted a new RAT (Remote Administration Tool) advertised in Dark Web and Telegram called Escanor. Resecurity, a Los Angeles-based cybersecurity company protecting Fortune 500 worldwide, identified a new RAT (Remote Administration Tool) advertised in Dark Web and Telegram called Escanor. The threat actors offer Android-based and PC-based versions of RAT, along with HVNC module and exploit builder to weaponize Microsoft Office and Adobe PDF documents to deliver malicious code.

Malware 96
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

US Aims to Revitalize Semiconductor Production With CHIPS Act

Security Boulevard

Between a global pandemic, rapid shifts in consumer spending and even inclement weather, there are a wide range of factors that have contributed to the semiconductor chip shortage. These semiconductors, which are essential to the production of many everyday electronics, have become increasingly scarce. In response, the U.S. has passed new legislation that will incentivize.

article thumbnail

New 'BianLian' Ransomware Variant on the Rise

Dark Reading

Novel ransomware was created with the Go open source programming language, demonstrating how malware authors increasingly are opting to employ the flexible coding language.

article thumbnail

SiliconANGLE includes BluBracket in the top cybersecurity innovator list at BlackHat 2022

Security Boulevard

SiliconANGLE published a list of the Top 7 cybersecurity innovators from the myriad of companies that exhibited at BlackHat 2022 in Las Vegas, August 6-11, 2022. As part of the vetting process, BluBracket conducted a briefing with Jason Bloomberg, founder and president of analyst firm Intellyx, which advises business leaders and technology vendors on their […].

article thumbnail

New Air-Gap Attack Uses MEMS Gyroscope Ultrasonic Covert Channel to Leak Data

The Hacker News

A novel data exfiltration technique has been found to leverage a covert ultrasonic channel to leak sensitive information from isolated, air-gapped computers to a nearby smartphone that doesn't even require a microphone to pick up the sound waves.

98
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

CISA is warning of high-severity PAN-OS DDoS flaw used in attacks

Bleeping Computer

A recent vulnerability found in Palo Alto Networks' PAN-OS has been added to the catalog of Known Exploitable Vulnerabilities from the U.S. Cybersecurity and Infrastructure Security Agency (CISA). [.].

DDOS 95
article thumbnail

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 15, 2022

Security Boulevard

All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 15th, 2022. I’ve also included some comments on these stories. Newly Uncovered PyPI Package Drops Fileless Cryptominer to […]… Read More.

article thumbnail

Zero-day Vulnerability Abused by Cybercriminals to Steal Crypto from Bitcoin ATMs

Heimadal Security

Malicious actors have taken advantage of a zero-day flaw in General Bytes Bitcoin ATM servers to steal cryptocurrency from clients. The way it works is that once a person deposits or buys bitcoin through the ATM, the money will instead be diverted to the threat actors. The hardware and software company General Bytes produces Bitcoin […]. The post Zero-day Vulnerability Abused by Cybercriminals to Steal Crypto from Bitcoin ATMs appeared first on Heimdal Security Blog.

article thumbnail

5 Techniques To Protect Open-Source Software

Security Boulevard

Open-source software brings many benefits to the modern business environment. And, in terms of security, the more developers involved in open-source software, the better — arguably, there’s a better overall security foundation if there are more eyes to spot flaws. As such, software supply chain issues and vulnerabilities around popular open-source packages continue to be.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.