Mon.Sep 04, 2023

article thumbnail

Securing Linux Policy

Tech Republic Security

Linux is a powerful and customizable operating system that has been the backbone of many businesses for decades. This policy from TechRepublic Premium provides guidelines for securing Linux on company computers and computers used to conduct company business. It assumes administrative knowledge of Linux servers and/or workstation environments. From the policy: DEVELOP TEMPLATES BASED ON.

123
123
article thumbnail

A massive DDoS attack took down the site of the German financial agency BaFin

Security Affairs

A distributed denial-of-service (DDoS) attack took the site of the German Federal Financial Supervisory Authority (BaFin) down. A distributed denial-of-service (DDoS) attack took the site of the German Federal Financial Supervisory Authority (BaFin) down for some days. It is not clear who is behind the DDoS attack, but the media speculate that it was launched by pro-Russian hacktivists in response to the German financial and military support to Ukraine.

DDOS 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Okta: Hackers target IT help desks to gain Super Admin, disable MFA

Bleeping Computer

Identity and access management company Okta released a warning about social engineering attacks targeting IT service desk agents at U.S.-based customers in an attempt to trick them into resetting multi-factor authentication (MFA) for high-privileged users. [.

article thumbnail

X will collect biometric data from its premium users

Security Affairs

The social media site X announced that it will collect premium users’ biometric data for security and identification purposes. The social media platform X (formerly known as Twitter) has updated its privacy policy informing its premium users that the company will collect their biometric data to curb fraud and prevent impersonation. Bloomberg first reported the news and confirmed that the change will only impact premium users.

Media 131
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

X (Twitter) to Collect Biometric Data from Premium Users to Combat Impersonation

The Hacker News

X, the social media site formerly known as Twitter, has updated its privacy policy to collect users’ biometric data to tackle fraud and impersonation on the platform. “Based on your consent, we may collect and use your biometric information for safety, security, and identification purposes,” the company said. The revised policy is expected to go into effect on September 29, 2023.

Media 118
article thumbnail

“Smishing Triad” Targeted USPS and US Citizens for Data Theft

Security Affairs

Resecurity has identified a large-scale smishing campaign, tracked as Smishing Triad, targeting the US Citizens. Earlier episodes have revealed victims from the U.K., Poland, Sweden, Italy, Indonesia, Japan and other countries – the group was impersonating the Royal Mail, New Zealand Postal Service (NZPOST), Correos (Spain), Postnord, Poste Italiane and the Italian Revenue Service (Agenzia delle Entrate).

More Trending

article thumbnail

Cybercrime will cost Germany $224 billion in 2023

Security Affairs

Cybercrime will cost Germany 206 billion euros ($224 billion) in 2023, German digital association Bitkom told Reuters. According to the German digital association Bitkom, cybercrime will have a worrisome impact on the economy of the state in 2023. Bitkom estimated that cybercriminal activities, such as fraud, cyber espionage, the theft of intellectual property, sabotage, and extortion will cost Germany 206 billion euros ($224 billion) in 2023.

article thumbnail

Hackers Exploit MinIO Storage System Vulnerabilities to Compromise Servers

The Hacker News

An unknown threat actor has been observed weaponizing high-severity security flaws in the MinIO high-performance object storage system to achieve unauthorized code execution on affected servers. Cybersecurity and incident response firm Security Joes said the intrusion leveraged a publicly available exploit chain to backdoor the MinIO instance. The comprises CVE-2023-28432 (CVSS score: 7.

article thumbnail

Password-stealing Chrome extension smuggled on to Web Store

Malwarebytes

Researchers at the University of Wisconsin–Madison have demonstrated that Chrome browser extensions can steal passwords from the text input fields in websites, even if the extension is compliant with Chrome's latest security and privacy standard, Manifest V3. To prove it, they created a proof of concept browser extension that could steal passwords and put it through the Chrome Web Store review process.

Passwords 117
article thumbnail

Hackers exploit MinIO storage system to breach corporate networks

Bleeping Computer

Hackers are exploiting two recent MinIO vulnerabilities to breach object storage systems and access private information, execute arbitrary code, and potentially take over servers. [.

115
115
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Analyzing a Facebook Profile Stealer Written in Node.js

Trend Micro

We analyze an information stealer written in Node.js, packaged into an executable, exfiltrated stolen data via both Telegram bot API and a C&C server, and employed GraphQL as a channel for C&C communication.

Phishing 111
article thumbnail

Freecycle confirms massive data breach impacting 7 million users

Bleeping Computer

Freecycle, an online forum dedicated to exchanging used items rather than trashing them, confirmed a massive data breach that affected more than 7 million users. [.

article thumbnail

Risk Management Framework Steps and Best Practices

Security Boulevard

The Risk Management Framework is a process that assists organizations in identifying, evaluating, and mitigating potential risks. The post Risk Management Framework Steps and Best Practices appeared first on Scytale. The post Risk Management Framework Steps and Best Practices appeared first on Security Boulevard.

Risk 109
article thumbnail

Vietnamese Cybercriminals Targeting Facebook Business Accounts with Malvertising

The Hacker News

Malicious actors associated with the Vietnamese cybercrime ecosystem are leveraging advertising-as-a-vector on social media platforms such as Meta-owned Facebook to distribute malware. “Threat actors have long used fraudulent ads as a vector to target victims with scams, malvertising, and more,” WithSecure researcher Mohammad Kazem Hassan Nejad said.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

German financial agency site disrupted by DDoS attack since Friday

Bleeping Computer

The German Federal Financial Supervisory Authority (BaFin) announced today that an ongoing distributed denial-of-service (DDoS) attack has been impacting its website since Friday. [.

DDOS 104
article thumbnail

Everything You Wanted to Know About AI Security but Were Afraid to Ask

The Hacker News

There’s been a great deal of AI hype recently, but that doesn’t mean the robots are here to replace us. This article sets the record straight and explains how businesses should approach AI. From musing about self-driving cars to fearing AI bots that could destroy the world, there has been a great deal of AI hype in the past few years.

102
102
article thumbnail

Getting off the hook: 10 steps to take after clicking on a phishing link

We Live Security

Phishing emails are a weapon of choice for criminals intent on stealing people’s personal data and planting malware on their devices. The healing process does not end with antivirus scanning.

article thumbnail

7 Key MXDR Benefits

Heimadal Security

Protecting businesses has gotten increasingly difficult today. The sophistication of cyberattacks, the growth of distributed workforces, and the increased reliance on third-party providers have greatly expanded the attack surface, making it more complex than ever. In order to minimize the impact of a security event, proactive detection and coordinated response are essential.

92
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Deep Instinct takes a prevention-first approach to stopping ransomware and other malware using deep learning

Graham Cluley

Graham Cluley Security News is sponsored this week by the folks at Deep Instinct. Thanks to the great team there for their support! Deep Instinct protects the data of the world’s largest brands by delivering on the promise of threat prevention with the only cybersecurity platform fully powered by Deep Learning.

Malware 90
article thumbnail

Why Is MDR Better Than EDR: Enhancing Cybersecurity in the Modern World

Heimadal Security

Cybersecurity has become a paramount concern for businesses and organizations in today’s interconnected world. The rise of sophisticated cyber threats and the increasing complexity of IT environments have made it crucial for companies to invest in robust security solutions. Managed Detection and Response (MDR) and Endpoint Detection and Response (EDR) have emerged as key players […] The post Why Is MDR Better Than EDR: Enhancing Cybersecurity in the Modern World appeared first on He

article thumbnail

Meta Takes Down Thousands of Accounts Involved in Disinformation Ops from China and Russia

The Hacker News

Meta has disclosed that it disrupted two of the largest known covert influence operations in the world from China and Russia, blocking thousands of accounts and pages across its platform.

article thumbnail

How to get a handle on shadow AI

InfoWorld on Security

CIOs and CISOs have long grappled with the challenge of shadow IT—technology that is being used within an enterprise but that is not officially sanctioned by the IT or security department. According to Gartner research , 41% of employees acquired, modified, or created technology outside of IT’s visibility in 2022, and that number was expected to climb to 75% by 2027.

CISO 84
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Realism Reigns on AI at Black Hat and DEF CON

Dark Reading

Realistic expectations and caution began to replace wonder and confusion for generative AI at the recent security industry gatherings.

98
article thumbnail

A Personal Story of Recovering from Identity Theft

SecureWorld News

My wife and I decided to do some car shopping. Nothing new, but something newer than our 2018 Kia Sportage that would provide better gas mileage as she finishes year one of a new outside sales job that requires travel throughout the great Northwest territory, including Washington, Idaho, and our home state of Oregon. We researched hybrids and all-electric models, but before the daunting task of visiting auto dealerships, I thought I'd reach out to my credit union to see what kind of financing de

article thumbnail

Facing Third-Party Threats With Non-Employee Risk Management

Dark Reading

As businesses continue to grapple with third-party threats, a revamped approach to non-employee risk management can help limit their potential exposure.

Risk 85
article thumbnail

Happy Canadian Labour Day! / Bonne Fête du Travail Canadienne!

Security Boulevard

Interior view of workers at one of the steel processing plants in Hamilton, circa 1920. ( MIKAN 4915719 ) - Image Courtesy of Library and Archives Canada ( LAC ). Permalink The post Happy Canadian Labour Day! / Bonne Fête du Travail Canadienne! appeared first on Security Boulevard.

57
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

How Video Technology Can Boost Your Business: A Comprehensive Guide

Hackology

Video technology has become a powerful tool for businesses of all sizes to reach their target audience and increase engagement. From social media platforms to company websites, video content has become a staple in marketing strategies. Harnessing the power of video technology can take your business to the next level, providing a unique and effective way to communicate with your customers.

article thumbnail

Happy United States Labor Day Weekend 2023 / Feliz Fin de Semana del Día del Trabajo de Estados Unidos 2023 / Joyeux Fin de Semaine de la Fête du Travail aux États-Unis 2023

Security Boulevard

Labor Day 2023 - Three Day Weekend Edition! Permalink The post Happy United States Labor Day Weekend 2023 / Feliz Fin de Semana del Día del Trabajo de Estados Unidos 2023 / Joyeux Fin de Semaine de la Fête du Travail aux États-Unis 2023 appeared first on Security Boulevard.

57
article thumbnail

8 Container Security Best Practices & Tips

eSecurity Planet

Many modern enterprises and service-driven companies run their digital operations in container environments, making it easier to set up distinct permissions, workflows, and rules for each microservice and set of applications they’re running. This modern infrastructure choice brings numerous advantages to operational workflows, but without the appropriate security policies and tools in place, it can also open the door to new security vulnerabilities and attack vectors.

article thumbnail

What is Identity Segmentation?

Security Boulevard

More than just IP addresses or VLANs, identity segmentation is recognized best practice for business segmentation protection Identity segmentation focuses on segmenting access to network resources and applications based on the identity of users or devices. Instead of relying solely on traditional network parameters like IP addresses or VLANs to determine access, identity segmentation uses.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.