Sat.Sep 10, 2022

article thumbnail

Winamp 5.9 Final released and it still whips the Llama's ass

Bleeping Computer

Winamp 5.9 Final has been released after four years of development and includes numerous improvements, including Windows 11 support, playback of HTTPS:// streams, and various bug fixes. [.].

Software 145
article thumbnail

New Information Supplement: Guidance for Containers and Container Orchestration Tools

PCI perspectives

PCI Security Standards Council has published a new Information Supplement: Guidance for Containers and Container Orchestration Tools. This document was produced by the 2021 Special Interest Group (SIG), the members of which provided their expertise and shared experience for applying best practices to containers and container orchestration tools for payment systems.?.

126
126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware gangs switching to new intermittent encryption tactic

Bleeping Computer

A growing number of ransomware groups are adopting a new tactic that helps them encrypt their victims' systems faster while reducing the chances of being detected and stopped. [.].

article thumbnail

US Treasury sanctioned Iran ’s Ministry of Intelligence over Albania cyberattack

Security Affairs

The U.S. Treasury Department sanctioned Iran ‘s Ministry of Intelligence and Security (MOIS) and its Minister of Intelligence over the Albania cyberattack. The U.S. Treasury Department announced sanctions against Iran ‘s Ministry of Intelligence and Security (MOIS) and its Minister of Intelligence over the cyber attack that hit Albania in July.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Sitting in Cars with Hackers

Security Boulevard

Are organizations doing enough to protect customer data? The auto industry can teach us a lot about vulnerability management. The post Sitting in Cars with Hackers appeared first on Security Boulevard.

117
117
article thumbnail

Scammers live-streamed on YouTube a fake Apple crypto event

Security Affairs

Scammers live-streamed on YouTube an old interview with Tim Cook as part of a fake Apple crypto event, and tens of thousands of users viewed it. Cybercriminals were live-streaming on YouTube an old interview with Tim Cook as part of a fake Apple crypto event, and tens of thousands of users viewed it. The interview was transmitted by CNN conducted in 2018.

Scams 120

More Trending

article thumbnail

IHG suffered a cyberattack that severely impacted its booking process

Security Affairs

InterContinental Hotels Group PLC (IHG) discloses a security breach, parts of its IT infrastructure has been subject to unauthorised activity. The hospitality conglomerate, InterContinental Hotel Group (IHG) manages 17 hotel chains, including the Regent, Crowne Plaza, Holiday Inn, and Candlewood Suites. IHG operates 6,028 hotels in more than 100 different countries.

article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 9/9

Security Boulevard

Insight #1. ". What is holding you back from evaluating a better way to do application security at your organization? I talk to many who are just flat-out unhappy with their current tools, but they continue to pay for the services every year because of the expense of changing. If you are unhappy, use it to your benefit to either get better support from your current provider or as leverage to move to a new provider, knowing that your overall total cost of ownership should remain the same or go do

CISO 108
article thumbnail

The Week in Ransomware - September 9th 2022 - Schools under fire

Bleeping Computer

Ransomware gangs have been busy this week, launching attacks against NAS devices, one of the largest hotel groups, IHG, and LAUSD, the second largest school district in the USA. [.].

article thumbnail

China-Linked BRONZE PRESIDENT APT targets Government officials worldwide

Security Affairs

China-linked BRONZE PRESIDENT group is targeting government officials in Europe, the Middle East, and South America with PlugX malware. Secureworks researchers reported that China-linked APT group BRONZE PRESIDENT conducted a new campaign aimed at government officials in Europe, the Middle East, and South America with the PlugX malware. Attacks part of this campaign were spotted in June and July 2022.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

North Korean APT Lazarus Targets Energy Sector in US, Canada, Japan

SecureWorld News

The North Korean hacking group known as Lazarus has turned its attention to a new sector, targeting energy providers in the United States, Canada, and Japan in a campaign that lasted between February and July 2022. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) previously warned of the cyber gang targeting cryptocurrency and blockchain companies in April of this year.

Malware 93
article thumbnail

U.S. Imposes New Sanctions on Iran Over Cyberattack on Albania

The Hacker News

The U.S. Treasury Department on Friday announced sanctions against Iran's Ministry of Intelligence and Security (MOIS) and its Minister of Intelligence, Esmaeil Khatib, for engaging in cyber-enabled activities against the nation and its allies.

article thumbnail

Coinbase funds lawsuit against Tornado Cash cryptomixer sanctions

Bleeping Computer

Coinbase announced on Tuesday that it is funding a lawsuit brought by six people in the U.S. against the Department of Treasury's for the sanctions on the Tornado Cash open-source cryptocurrency mixer platform. [.].

article thumbnail

BSides Vancouver 2022 – Chris Timmons’ ‘Cracking Passwords For Fun And Profit’

Security Boulevard

Our sincere thanks to BSides Vancouver for publishing their outstanding conference videos on the organization's YouTube channel. Permalink. The post BSides Vancouver 2022 – Chris Timmons’ ‘Cracking Passwords For Fun And Profit’ appeared first on Security Boulevard.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Hackers Target Los Angeles School District With Ransomware

WIRED Threat Level

Plus: Albania cuts ties with Iran, claims of a TikTok data breach that didn’t happen, and much more.

article thumbnail

Fall Foliage: JavaScript/OJS Edition

Security Boulevard

I’ve been (mostly) keeping up with annual updates for my R/{sf} U.S. foliage post which you can find on GH. This year, we have Quarto, and it comes with so many batteries included that you’d think it was Christmas. One of those batteries is full support for the Observable runtime. These are used in {ojs}. Continue reading ?. The post Fall Foliage: JavaScript/OJS Edition appeared first on Security Boulevard.

80
article thumbnail

How Do You Help Your IT Team Stay Ahead of Threats?

Security Boulevard

The post How Do You Help Your IT Team Stay Ahead of Threats? appeared first on Digital Defense. The post How Do You Help Your IT Team Stay Ahead of Threats? appeared first on Security Boulevard.

76
article thumbnail

IronNet’s September Threat Intelligence Brief 2022

Security Boulevard

Microsoft releases a report on its disruption of a Russian cyber-espionage group called SEABORGIUM (COLDRIVER) that has targeted over 30 organizations since the beginning of 2022, primarily in NATO countries and in the sectors of defense consulting, NGOs, IGOs, think tanks and higher education. The post IronNet’s September Threat Intelligence Brief 2022 appeared first on Security Boulevard.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

How API Security Can Help You Prepare For FedRAMP

Security Boulevard

Cloud companies that wish to do business with the United States federal government can only do so if they receive authorization under the Federal Risk and Authorization Management Program (FedRAMP). For a cloud service or product to get authorized through FedRAMP, its maker must demonstrate that it meets certain security standards. Given the importance and predominance of Application Programming Interfaces (APIs) in cloud computing, API security is a critical factor in achieving FedRAMP authoriz

article thumbnail

BSides Vancouver 2022 – Shelly Giesbrecht’s ‘Tailoring Evidence Preservation For Incident Objectives’

Security Boulevard

Our sincere thanks to BSides Vancouver for publishing their outstanding conference videos on the organization's YouTube channel. Permalink. The post BSides Vancouver 2022 – Shelly Giesbrecht’s ‘Tailoring Evidence Preservation For Incident Objectives’ appeared first on Security Boulevard.

article thumbnail

Use Terraform and Delphix together to automate your data for DevOps

Security Boulevard

Use Terraform and Delphix together to automate your data for DevOps. jasonaxelrod. Fri, 09/09/2022 - 11:36. The new Terraform Provider for Delphix allows users to automatically provision fresh, compliant, and complete test data environments. Brian Muskoff. Sep 08, 2022. Introducing the new Terraform Provider for Delphix. Over the last decade, almost all parts of the enterprise application stack have been automated.

article thumbnail

What’s most important for a CISO in API security?

Security Boulevard

As threats to networks and systems have changed, so have CISOs’ priorities. API security has grown more important with everything as a service and in the cloud. Today’s CISOs must ensure they have a plan for protecting APIs. To learn what’s most crucial when protecting APIs, we surveyed CISOs and other security specialists. Below find [.]. The post What’s most important for a CISO in API security?

CISO 57
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

XKCD ‘First Internet Interaction’

Security Boulevard

The post XKCD ‘First Internet Interaction’ appeared first on Security Boulevard.