Thu.May 26, 2022

article thumbnail

Malware-Infested Smart Card Reader

Schneier on Security

Brian Krebs has an interesting story of a smart ID card reader with a malware-infested Windows driver, and US government employees who inadvertently buy and use them. But by all accounts, the potential attack surface here is enormous, as many federal employees clearly will purchase these readers from a myriad of online vendors when the need arises. Saicoo’s product listings, for example, are replete with comments from customers who self-state that they work at a federal agency (and several

Malware 325
article thumbnail

Old Python package comes back to life and delivers malicious payload

Tech Republic Security

A recently spotted supply chain attack abused an old but legitimate Python package to deliver a malicious payload. Read more on how the attacker managed to do it and how to protect yourself from it. The post Old Python package comes back to life and delivers malicious payload appeared first on TechRepublic.

167
167
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Italy announced its National Cybersecurity Strategy 2022/26

Security Affairs

Italy announced its National Cybersecurity Strategy for 2022/26, a crucial document to address cyber threats and increase the resilience of the country. Italy presented its National Cybersecurity Strategy for 2022/26 and reinforce the government’s commitment to addressing cyber threats and increasing the resilience of the country to cyber attacks.

article thumbnail

Microsoft Defender vs Trellix: EDR software comparison

Tech Republic Security

Looking to secure your network? Microsoft Defender and Trellix are two of the most popular endpoint detection and response software options. Compare the features of these EDR tools. The post Microsoft Defender vs Trellix: EDR software comparison appeared first on TechRepublic.

Software 158
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

If you get an email saying “Item stopped due to unpaid customs fee”, it’s a fake

Malwarebytes

Our spam traps recently caught a phishing scam that neatly illustrates some of the tactics scammers use routinely to avoid both human intuition, and automatic detection. The scam starts with an unsolicited email, of course… The scam email is ostensibly from the Post Office, an instantly recognisable postal service brand in the UK, and it tells recipients “There is a update in your parcel. item stopped due to unpaid customs fee.” [sic] This is an echo of an extremely popular SMS

Scams 145
article thumbnail

Enjoy greater online freedom with Atlas VPN

Tech Republic Security

Protect yourself online with this two-year subscription to the Atlas virtual private network. The post Enjoy greater online freedom with Atlas VPN appeared first on TechRepublic.

VPN 148

LifeWorks

More Trending

article thumbnail

NordLayer makes it easy for businesses to add VPN technology to remote workers

Tech Republic Security

Your enterprise needs a VPN. Consider NordLayer as your solution. The post NordLayer makes it easy for businesses to add VPN technology to remote workers appeared first on TechRepublic.

VPN 148
article thumbnail

Exposed: the threat actors who are poisoning Facebook

Security Affairs

An investigation of the infamous “Is That You?” video scam led Cybernews researchers into exposing threat actors who are poisoning Facebook. Original post @ [link]. An investigation of the infamous “Is That You?” video scam has led Cybernews researchers to a cybercriminal stronghold, from which threat actors have been infecting the social media giant with thousands of malicious links every day.

Scams 144
article thumbnail

New Linux-based ransomware targets VMware servers

CSO Magazine

Researchers at Trend Micro have discovered some new Linux-based ransomware that's being used to attack VMware ESXi servers, a bare-metal hypervisor for creating and running several virtual machines (VMs) that share the same hard drive storage. Called Cheerscrypt, the bad app is following in the footsteps of other ransomware programs—such as LockBit, Hive and RansomEXX—that have found ESXi an efficient way to infect many computers at once with malicious payloads.

article thumbnail

Experts warn of a new malvertising campaign spreading the ChromeLoader

Security Affairs

Researchers warn of a new malvertising campaign spreading the ChromeLoader malware that hijacks the victims’ browsers. Researchers from Red Canary observed a new malvertising campaign spreading the ChromeLoader malware that hijacks the victims’ browsers. ChromeLoader is a malicious Chrome browser extension, it is classified as a pervasive browser hijacker that modifies browser settings to redirect user traffic.

Malware 143
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Act Now: Leveraging PCI Compliance to Improve Security

Dark Reading

Let the threat landscape guide your company's timeline for complying with new data security standards for credit cards. Use the phase-in time to improve security overall — security as a process — not just comply with new standards.

143
143
article thumbnail

Ransomware demands acts of kindness to get your files back

The State of Security

The great thing about working in the world of cybersecurity is that there’s always something new. You may think you’ve seen it all, and then something comes along that completely surprises you. And that’s certainly true of the GoodWill ransomware, which security firm CloudSEK described this week. In fact, the GoodWill ransomware stands out so […]… Read More.

article thumbnail

Zyxel addresses four flaws affecting APs, AP controllers, and firewalls

Security Affairs

Zyxel addressed multiple vulnerabilities impacting many of its products, including APs, AP controllers, and firewalls. Zyxel has released security updates to address multiple vulnerabilities affecting multiple products, including firewall, AP, and AP controller products. Below is the list of the four vulnerabilities, the most severe one is a command injection flaw in some CLI commands tracked as CVE-2022-26532 (CVSS v3.1 7.8): CVE-2022-0734 : A cross-site scripting vulnerability was identified i

Firewall 142
article thumbnail

Retrofitting Temporal Memory Safety on C++

Google Security

Posted by Anton Bikineev, Michael Lippautz and Hannes Payer, Chrome security team Memory safety in Chrome is an ever-ongoing effort to protect our users. We are constantly experimenting with different technologies to stay ahead of malicious actors. In this spirit, this post is about our journey of using heap scanning technologies to improve memory safety of C++.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Remote bricking of Ukrainian tractors raises agriculture security concerns

CSO Magazine

Against the backdrop of horrific reports from Russia's Ukraine invasion, an encouraging story emerged earlier this month when unidentified Ukrainians remotely disabled tractors worth $5 million that Russian soldiers in the occupied city of Melitopol stole from Agrotek-Invest, an authorized John Deere dealer. The soldiers stole 27 pieces of farm machinery and shipped them primarily to Chechnya, 700 miles away, only to discover they had been rendered inoperable due to a "kill switch.

138
138
article thumbnail

ChromeLoader targets Chrome Browser users with malicious ISO files

Malwarebytes

If you’re on the hunt for cracked software or games, be warned. Rogue ISO archive files are looking to infect your systems with ChromeLoader. If you think campaigns such as this only target Windows users, you’d sadly be very much mistaken. The attack sucks in several operating systems and even uses mobiles as bait to draw in additional victims. Of PowerShells and ISOs.

Software 136
article thumbnail

A New Ransomware Variant Dubbed ‘Cheers’ Was Discovered

Heimadal Security

VMware ESXi is a hypervisor created by VMware that is of the enterprise-class and type-1 varieties. It is used for installing and servicing virtual machines. ESXi is a type-1 hypervisor, which means that it is not a software program that is put on an operating system; rather, it incorporates and integrates essential OS components, such […]. The post A New Ransomware Variant Dubbed ‘Cheers’ Was Discovered appeared first on Heimdal Security Blog.

article thumbnail

Who’s watching your webcam? The Screencastify Chrome extension story…

Naked Security

When you really need to make exceptions in cybersecurity, specify them as explicitly as you can.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Exploit released for critical VMware auth bypass bug, patch now

Bleeping Computer

Proof-of-concept exploit code is now available online for a critical authentication bypass vulnerability in multiple VMware products that allows attackers to gain admin privileges. [.].

article thumbnail

Managed detection and response in 2021

SecureList

Kaspersky Managed Detection and Response (MDR) helps organizations to complement existing detection capabilities or to expand limited in-house resources to protect their infrastructure from the growing number and complexity of threats in real time. We collect telemetry from clients’ networks and analyze it using machine learning and artificial intelligence, plus human threat-hunting analysts.

article thumbnail

Windows 11 KB5014019 breaks Trend Micro ransomware protection

Bleeping Computer

This week's Windows optional cumulative update previews have introduced a compatibility issue with some of Trend Micro's security products that breaks some of their capabilities, including the ransomware protection feature. [.].

article thumbnail

10 Strategies to Stop Ransomware Attacks

Security Boulevard

A ransomware attack can hold your organization’s data hostage. Attackers demand payment to release the information. Here are some ways to stop ransomware attacks. 1. Teach User Awareness A key line of defense against ransomware attacks is the users of the computer systems within your organization. You want to make sure your staff is adequately [.]. The post 10 Strategies to Stop Ransomware Attacks appeared first on TechSpective.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Twitter to pay $150m penalty for user data protection failure

CyberSecurity Insiders

Social media giant Twitter has been asked to pay a penalty of $150 million by the federal trade commission for failing to protect its user data over a 6-year span. The Financial implication will be redeemed by FTC and the Justice Department on a joint note. According to the order, Twitter which is soon going into the hands of Tesla Chief Elon Musk failed to protect its user info between 2013 to 2019 and was giving false security that it has all measures in place to protect the information that i

article thumbnail

ESET Research Podcast: UEFI in crosshairs of ESPecter bootkit

We Live Security

Listen to Aryeh Goretsky, Martin Smolár, and Jean-Ian Boutin discuss what UEFI threats are capable of and what the ESPecter bootkit tells us about their evolution. The post ESET Research Podcast: UEFI in crosshairs of ESPecter bootkit appeared first on WeLiveSecurity.

124
124
article thumbnail

Digital Driver’s License Fails Spectacularly — ‘Laughably Easy’ to Forge

Security Boulevard

Is your state implementing a digital driver’s license? You’d better hope it does better than the Australian state of New South Wales. The post Digital Driver’s License Fails Spectacularly — ‘Laughably Easy’ to Forge appeared first on Security Boulevard.

article thumbnail

Google shut down caching servers at two Russian ISPs

Bleeping Computer

Two Russian internet service providers (ISPs) have received notices from Google that the global caching servers on their network have been disabled. [.].

Internet 120
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

7 top privileged access management tools

CSO Magazine

One of the main objectives of the bad guys is to escalate to privileged account access wherever possible. The more unfettered access they can gain to administrative, superuser and infrastructure accounts, the freer rein they have to tap into sensitive data stores, tamper with critical systems, quietly gain carte blanche to do whatever they’d care to with a victim organization’s IT infrastructure and to do it all without being detected.

article thumbnail

Industrial Spy data extortion market gets into the ransomware game

Bleeping Computer

The Industrial Spy data extortion marketplace has now launched its own ransomware operation, where they now also encrypt victim's devices. [.].

Marketing 120
article thumbnail

Do not use Tails OS until a flaw in the bundled Tor Browser will be fixed

Security Affairs

The maintainers of the Tails project (The Amnesic Incognito Live System) warn users that the Tor Browser bundled with the OS could expose their sensitive information. The maintainers confirmed that Tor Browser in Tails 5.0 and earlier is unsafe to use for sensitive information. “ We recommend that you stop using Tails until the release of 5.1 (May 31) if you use Tor Browser for sensitive information (passwords, private messages, personal information, etc.).” reads the advisory publi

article thumbnail

Zyxel warns of flaws impacting firewalls, APs, and controllers

Bleeping Computer

Zyxel has published a security advisory to warn admins about multiple vulnerabilities affecting a wide range of firewall, AP, and AP controller products. [.].

Firewall 115
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!