Tue.Jun 14, 2022

article thumbnail

Ransomware Group Debuts Searchable Victim Data

Krebs on Security

Cybercrime groups that specialize in stealing corporate data and demanding a ransom not to publish it have tried countless approaches to shaming their victims into paying. The latest innovation in ratcheting up the heat comes from the ALPHV/BlackCat ransomware group, which has traditionally published any stolen victim data on the Dark Web. Today, however, the group began publishing individual victim websites on the public Internet, with the leaked data made available in an easily searchable form

article thumbnail

Hacking Tesla’s Remote Key Cards

Schneier on Security

Interesting vulnerability in Tesla’s NFC key cards: Martin Herfurt, a security researcher in Austria, quickly noticed something odd about the new feature: Not only did it allow the car to automatically start within 130 seconds of being unlocked with the NFC card, but it also put the car in a state to accept entirely new keys­with no authentication required and zero indication given by the in-car display. “The authorization given in the 130-second interval is too general… [it

Hacking 259
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

“Downthem” DDoS-for-Hire Boss Gets 2 Years in Prison

Krebs on Security

A 33-year-old Illinois man was sentenced to two years in prison today following his conviction last year for operating services that allowed paying customers to launch powerful distributed denial-of-service (DDoS) attacks against hundreds of thousands of Internet users and websites. The user interface for Downthem[.]org. Matthew Gatrel of St. Charles, Ill. was found guilty for violations of the Computer Fraud and Abuse Act (CFAA) related to his operation of downthem[.]org and ampnode[.]com , two

DDOS 187
article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m speaking at the Dublin Tech Summit in Dublin, Ireland, June 15-16, 2022. The list is maintained on this page.

225
225
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Half of IT leaders say passwords too weak for security purposes

Tech Republic Security

Most IT leaders are worried about passwords being stolen at their organization, according to a survey from Ping Identity. The post Half of IT leaders say passwords too weak for security purposes appeared first on TechRepublic.

Passwords 158
article thumbnail

Enterprise Mobile Security in 2022: How Your Business Can Stay Protected

Appknox

If you are not taking enterprise mobile security seriously, look at these stats:

Mobile 140

LifeWorks

More Trending

article thumbnail

Some Cybersecurity Startups Still Attract Funding Despite Headwinds

eSecurity Planet

With the plunge in tech stocks and the freeze in the IPO market, the funding environment for cybersecurity startups has come under pressure. According to Pitchbook, the amount of venture capital investment in the first quarter was off by 35.8% to $5.1 billion on a quarter-over-quarter basis. The median late-stage valuation fell by 26.1%. VCs are certainly getting pickier with their investments.

article thumbnail

An In-Depth Look at Software-Defined Perimeters

Heimadal Security

A software-defined perimeter, also known as SDP, is a security framework that restricts access to resources on the basis of an individual’s identification. The SDP is created to hide an organization’s infrastructure from outsiders while still allowing authorized users access to the infrastructure. Through the implementation of the SDP approach, the goal of establishing the […].

Software 122
article thumbnail

Latest Chrome Update Resolves Four High Risk Vulnerabilities

Digital Guardian

Google has yet again updated Chrome to resolve multiple vulnerabilities in the browser, including four marked high severity.

Risk 119
article thumbnail

Getting Started With the Metasploit Framework: A Pentesting Tutorial

eSecurity Planet

The Metasploit project contains some of the best security tools available, including the open source Metasploit Framework. Both pen testers and hackers use it to find and exploit vulnerabilities as well as to set up reverse shells, develop malicious payloads , or generate reports. The tool, maintained by Rapid7 , even offers comprehensive documentation , where you can learn the basics to start using it.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Murder suspect admits she tracked cheating partner with hidden AirTag

Naked Security

O! What a tangled web we weave, when first we practise to deceive.

article thumbnail

Vulnerability management mistakes CISOs still make

CSO Magazine

Multiple breaches, including the massive 2017 data breach at the credit reporting agency Equifax , have been traced back to unpatched vulnerabilities—a 2019 Tripwire study found that 27% of all breaches were caused by unpatched vulnerabilities, while a 2018 Ponemon study put the number at a jaw-dropping 60%.

CISO 116
article thumbnail

Is Cybersecurity a Top Priority for Politicians? World Politics and Cybersecurity

Heimadal Security

Since 2020, the Covid-19 pandemic has re-shaped the way in which we all live and work. In February 2022 another context came forth to drive change, especially in the (cyber)security market – the Russia-Ukraine conflict. This war, like the pandemic, is clearly driving the growth of the cybersecurity market, which is already expected to reach […].

article thumbnail

Ransomware gang creates site for employees to search for their stolen data

Bleeping Computer

The ALPHV ransomware gang, aka BlackCat, has brought extortion to a new level by creating a dedicated website that allows the customers and employees of their victim to check if their data was stolen in an attack [.].

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Congressional hearings focus on AI, machine learning challenges in cybersecurity

CSO Magazine

Congressional hearings on artificial intelligence and machine learning in cyberspace quietly took place in the U.S. Senate Armed Forces Committee’s Subcommittee on Cyber in early May 2022. The committee discussed the topic with representatives from Google, Microsoft and the Center for Security and Emerging Technology at Georgetown University. While work has begun in earnest within industry and government, it is clear that much still needs to be done.

article thumbnail

IDIQ Names 3 Industry Veterans to Grow Resident-Link Product Offering

Identity IQ

IDIQ Names 3 Industry Veterans to Grow Resident-Link Product Offering. IdentityIQ. — Company adds new executive and sales leadership for product focused on credit reporting of rental payments —. Temecula, California, June 14, 2022 – IDIQ , an industry leader in identity theft protection and credit monitoring, announces three veterans in the multi-family and credit industries have joined the company to help lead the company’s newly-acquired Resident-Link product and brand.

article thumbnail

Patch Tuesday June 2022 – Microsoft Releases Several Chromium Security Updates

Heimadal Security

This month’s Patch Tuesday has brought us some improvements and fixes for issues associated with Microsoft Edge Stable Channel (Version 102.0.1245.39), which incorporates the latest Security Updates of the Chromium project for CVE-2022-2011, CVE-2022-2010, CVE-2022-2008, and CVE-2022-2007. The Follina Vulnerability Remains Unpatched The most important vulnerability to be addressed, remains CVE-2022-30190, as it was discovered that hosts […].

105
105
article thumbnail

Experts spotted Syslogk, a Linux rootkit under development

Security Affairs

Experts spotted a new Linux rootkit, dubbed ‘Syslogk,’ that uses specially crafted “magic packets” to activate a dormant backdoor on the device. Researchers from antivirus firm Avast spotted a new Linux rootkit, dubbed ‘Syslogk,’ that uses specially crafted “magic packets” to activate a dormant backdoor on the device. The experts reported that the Syslogk rootkit is heavily based on an open-source, well-known kernel rootkit for Linux, dubbed Adore-Ng.

Malware 101
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Understanding and Mitigating Single Sign-on Risk

Dark Reading

SSO's one-to-many architecture is both a big advantage and a weakness.

article thumbnail

New Syslogk Linux Rootkit Lets Attackers Remotely Command It Using "Magic Packets"

The Hacker News

A new covert Linux kernel rootkit named Syslogk has been spotted under development in the wild and cloaking a malicious payload that can be remotely commandeered by an adversary using a magic network traffic packet.

99
article thumbnail

Cloudflare mitigates record-breaking HTTPS DDoS attack

Bleeping Computer

Internet infrastructure firm Cloudflare said today that it mitigated a 26 million request per second distributed denial-of-service (DDoS) attack, the largest HTTPS DDoS attack detected to date. [.].

DDOS 99
article thumbnail

Google: SBOMs Effective Only if They Map to Known Vulns

Dark Reading

SBOMs should be connected with vulnerability databases to fulfill their promise of reducing risk, Google security team says.

Risk 98
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Clear Majority of Cybersecurity Professionals Believe They are in a Perpetual State of Cyberwar: Venafi Survey

Security Boulevard

Clear Majority of Cybersecurity Professionals Believe They are in a Perpetual State of Cyberwar: Venafi Survey. brooke.crothers. Tue, 06/14/2022 - 16:02. 2 views. Current geo-political conflict has profound change on perception of cyberwar. The Ukraine-Russia war has caused a pronounced shift in the way Cybersecurity professionals view the cyberwar.

article thumbnail

Microsoft Patches 'Follina' Zero-Day Flaw in Monthly Security Update

Dark Reading

Here are which Microsoft patches to prioritize among the June Patch Tuesday batch.

98
article thumbnail

Cloudflare Saw Record-Breaking DDoS Attack Peaking at 26 Million Request Per Second

The Hacker News

Cloudflare on Tuesday disclosed that it had acted to prevent a record-setting 26 million request per second (RPS) distributed denial-of-service (DDoS) attack last week, making it the largest HTTPS DDoS attack detected to date.

DDOS 98
article thumbnail

A flaw in Zimbra email suite allows stealing login credentials of the users

Security Affairs

A high-severity vulnerability in the Zimbra email suite could be exploited by an unauthenticated attacker to steal login credentials of users. Researchers from Sonarsource have discovered a high-severity vulnerability impacting the Zimbra email suite, tracked as CVE-2022-27924 (CVSS score: 7.5), that can be exploited by an unauthenticated attacker to steal login credentials of users without user interaction. “Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0 allows an unauthenticated attacker

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Firefox now blocks cross-site tracking by default for all users

Bleeping Computer

Mozilla says that starting today, all Firefox users will now be protected by default against cross-site tracking while browsing the Internet. [.].

article thumbnail

API Security Best Practices

Security Affairs

Organizations face the constant need to protect these APIs from attacks so they can protect organizational data. Organizations are rapidly opening their ecosystem through Application Programming Interfaces (API) by ensuring seamless access to data and interaction with external software components and services. APIs are the gateway to providing the high security of data in an organization.

article thumbnail

Microsoft June 2022 Patch Tuesday fixes 1 zero-day, 55 flaws

Bleeping Computer

Today is Microsoft's June 2022 Patch Tuesday, and with it comes fixes for 55 vulnerabilities, including fixes for the Windows MSDT 'Follina' zero-day vulnerability and new Intel MMIO flaws. [.].

98
article thumbnail

SeaFlower campaign distributes backdoored versions of Web3 wallets to steal seed phrases

Security Affairs

Chinese cybercriminals are using SeaFlower backdoored versions of iOS and Android Web3 wallets to steal users’ seed phrase. Researchers from Confiant have uncovered a sophisticated malware campaign, tracked as SeaFlower, targeting Web3 wallet users. Chinese crooks are spreading backdoored versions of iOS and Android Web3 wallets to steal users’ seed phrase.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!