Tue.May 17, 2022

article thumbnail

When Your Smart ID Card Reader Comes With Malware

Krebs on Security

Millions of U.S. government employees and contractors have been issued a secure smart ID card that enables physical access to buildings and controlled spaces, and provides access to government computer networks and systems at the cardholder’s appropriate security level. But many government employees aren’t issued an approved card reader device that lets them use these cards at home or remotely, and so turn to low-cost readers they find online.

Malware 354
article thumbnail

Attacks on Managed Service Providers Expected to Increase

Schneier on Security

CISA, NSA, FBI, and similar organizations in the other Five Eyes countries are warning that attacks on MSPs — as a vector to their customers — are likely to increase. No details about what this prediction is based on. Makes sense, though. The SolarWinds attack was incredibly successful for the Russian SVR, and a blueprint for future attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH SNAPHOT: Can ‘CAASM’ help slow, perhaps reverse, attack surface expansion?

The Last Watchdog

Defending companies as they transition to cloud-first infrastructures has become a very big problem – but it’s certainly not an unsolvable one. Coming Wed., May 18: How security teams can help drive business growth — by embracing complexity. . The good news is that a long-overdue transition to a new attack surface and security paradigm is well underway, one built on a fresh set of cloud-native security frameworks and buttressed by software-defined security technologies.

article thumbnail

Vulnerabilities found in Bluetooth Low Energy gives hackers access to numerous devices

Tech Republic Security

NCC Group has found proof of concept that BLE devices can be exploited from anywhere on the planet. The post Vulnerabilities found in Bluetooth Low Energy gives hackers access to numerous devices appeared first on TechRepublic.

187
187
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Securing Your Migration to the Cloud

Cisco Security

Cisco Secure Access by Duo and Cisco Umbrella expands availability on AWS Marketplace. Cisco Secure powers security resilience enabling you to protect the integrity of your business amidst unpredictable threats and major change, such as migrating to the cloud. As a leader in cloud enablement, Cisco Secure is excited to announce the availability of our Security SaaS portfolio on AWS Marketplace.

DNS 145
article thumbnail

Cybersecurity pros spend hours on issues that should have been prevented

Tech Republic Security

Security staffers can spend more than five hours addressing security flaws that occurred during the application development cycle, says Invicti. The post Cybersecurity pros spend hours on issues that should have been prevented appeared first on TechRepublic.

LifeWorks

More Trending

article thumbnail

Half of global CISOs feel their organization is unprepared to deal with cyberattacks

Tech Republic Security

Human error is considered by IT executives to be the biggest vulnerability for organizations in the year ahead. The post Half of global CISOs feel their organization is unprepared to deal with cyberattacks appeared first on TechRepublic.

CISO 159
article thumbnail

Gmail-linked Facebook accounts vulnerable to attack using a chain of bugs—now fixed

Malwarebytes

A security researcher has disclosed how he chained together multiple bugs in order to take over Facebook accounts that were linked to a Gmail account. Youssef Sammouda states it was possible to target all Facebook users but that it was more complicated to develop an exploit, and using Gmail was actually enough to demonstrate the impact of his discoveries.

article thumbnail

Visa breaks down $9 billion investment in security, fraud initiatives

Tech Republic Security

In an increasingly digital-first world, the credit card company is using a multi-layered security approach to enable safe transactions. The post Visa breaks down $9 billion investment in security, fraud initiatives appeared first on TechRepublic.

148
148
article thumbnail

Long lost @ symbol gets new life obscuring malicious URLs

Malwarebytes

Threat actors have rediscovered an old and little-used feature of web URLs, the innocuous @ symbol we usually see in email addresses, and started using it to obscure links to their malicious websites. Researchers from Perception Point noticed it being used in a cyberattack against multiple organization recently. While the attackers are still unknown, Perception Point traced them to an IP in Japan.

Phishing 142
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Security, employee compliance biggest challenges when supporting remote workers

Tech Republic Security

Maintaining security across remote endpoints and ensuring that remote employees comply with new controls are two vexing issues for IT professionals, says Workspot. The post Security, employee compliance biggest challenges when supporting remote workers appeared first on TechRepublic.

148
148
article thumbnail

Evaluation of cyber activities and the threat landscape in Ukraine

SecureList

Introduction. When the war in Ukraine broke out, many analysts were surprised to discover that what was simultaneously happening in the cyber domain did not match their predictions [1]. Since the beginning of the fighting, new cyberattacks taking place in Ukraine have been identified every week, which lead to a variety of interpretations – and indeed a global feeling of confusion.

article thumbnail

NerbianRAT Trojan Spreads via Emails

Heimadal Security

Researchers have noticed a RAT (remote access trojan) dubbed NerbianRAT being distributed via emails. Its name comes from a malware code function’s name. NerbianRAT: How It Is Distributed Researchers from Proofpoint have recently published a report providing details about NerbianRAT. The malicious emails spreading this malware impersonate the World Health Organization (WHO) assuming to send […].

Malware 131
article thumbnail

AirTag stalking: What is it, and how can I avoid it?

Malwarebytes

More voices are being raised against the use of everyday technology repurposed to attack and stalk people. Most recently, it’s reported that Ohio has proposed a new bill in relation to electronic tagging devices. The bill, aimed at making short work of a loophole allowing people with no stalking or domestic violence record to use tracking devices, is currently in the proposal stages.

Mobile 131
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

HotBot VPN Review 2022: Fast And Secure VPN Service

SecureBlitz

In this HotBot VPN review, we will examine its features, apps, pricing, etc. Read on… HotBot is a VPN service that’s marketed as a fast, easy way to unblock websites and protect your privacy online. The company claims that this app can give you unrestricted access to all of your favorite sites, keep prying eyes. The post HotBot VPN Review 2022: Fast And Secure VPN Service appeared first on SecureBlitz Cybersecurity.

VPN 130
article thumbnail

Advanced persistent threat group feature: Mustang Panda

Digital Shadows

Advanced persistent threat (APT) groups are often tricky to wrap your head around. By their nature, state-associated groups are well-resourced. The post Advanced persistent threat group feature: Mustang Panda first appeared on Digital Shadows.

128
128
article thumbnail

Hackers can steal your Tesla Model 3, Y using new Bluetooth attack

Bleeping Computer

Security researchers at the NCC Group have developed a tool to carry out a Bluetooth Low Energy (BLE) relay attack that bypasses all existing protections to authenticate on target devices. [.].

article thumbnail

The Ultimate Antivirus Software Guide: What Is An Antivirus?

SecureBlitz

Have you been hearing about Antivirus lately but you don’t know what it means and what it does? Don’t worry this article will serve as an Antivirus software guide that you can always refer to. When it comes to the cyber security world, terms like Antivirus, VPNs, Hacking, and others are likely to pop into. The post The Ultimate Antivirus Software Guide: What Is An Antivirus?

Antivirus 123
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Google Cloud boosts open-source security, simplifies zero-trust rollouts

InfoWorld on Security

New Google Cloud security services aim to strengthen open-source security, simplify zero-trust adoption, and improve cloud governance.

article thumbnail

How Virtual Phone Numbers Can Help Protect Your Identity

Identity IQ

How Virtual Phone Numbers Can Help Protect Your Identity. IdentityIQ. Do you freely give out your phone number when you’re signing up on a shopping website or meeting a new acquaintance? If so, you should know that criminals can use your phone number to commit identity theft. For example, scammers may try to spoof (impersonate) your legitimate phone number to contact your friends and family, pretending to be you.

article thumbnail

Software Supply Chain: A Risky Time for Dependencies

eSecurity Planet

The software supply chain is a critical element in the lifecycle of applications and websites. The interdependencies and components common in modern software development can increase the attack surface and sometimes allow hackers to bypass robust security layers you’ve added to your infrastructure. Indeed, only one flaw in the code base can be enough to compromise the entire supply chain.

Software 120
article thumbnail

How to Secure Mobile Apps: A Complete Checklist for 2022

Appknox

Full-fledged security is what every one needs! Due to the significant rise in cyber and malware attacks on the different apps, mobile app security is considered a critical component of app development. Therefore, having a highly secured mobile app ensures a hassle-free business operation!

Mobile 119
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Role Of The Internet During The Times Of Pandemic

SecureBlitz

Here, you will identify the role of the Internet during the pandemic times. The Internet is a crown jewel of the modern technological world. Due to its immense amounts of benefits to mankind, it is considered the greatest invention of human history after the wheel. The amount of benefits that humanity has reaped from the. The post Role Of The Internet During The Times Of Pandemic appeared first on SecureBlitz Cybersecurity.

Internet 119
article thumbnail

Your social media account hasn’t been hacked, it’s been cloned!

The State of Security

A recent Facebook post from a family member made me realize that I needed to write about an overused term. A term, that when used, causes chaos and concern. I don’t blame the family member for using it, I’ve seen it used hundreds of times over the past few years and I’ve seen IT and […]… Read More. The post Your social media account hasn’t been hacked, it’s been cloned!

Media 117
article thumbnail

Security in Milliseconds: Visa Invests in Payment Security as E-Commerce Surges

eSecurity Planet

The COVID-19 pandemic has driven a massive increase in e-commerce spending, doubling to an expected $1 trillion this year, according to Adobe. But that spending surge has brought with it a corresponding rise in payment security challenges. eSecurity Planet sat down with Dustin White, chief risk data officer at Visa, to discuss some of the steps the credit card and online payment giant has taken to combat fraud and improve cybersecurity.

Risk 117
article thumbnail

Privacy Program Management: How to Earn Mega Returns

TrustArc

The right privacy program management can save your organization millions. If that number seems too good to be true, keep reading.

111
111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Atlas VPN Review 2022: Is It Safe And Secure?

SecureBlitz

Read this Atlas VPN review to learn more about it. With so many VPN providers on the market today, it can be challenging to find one that offers something unique. But that’s exactly what you get with AtlasVPN. When you’re traveling to a new country, it can be nerve-wracking to figure out how you can. The post Atlas VPN Review 2022: Is It Safe And Secure?

VPN 111
article thumbnail

‘Thanos’ Ransomware Builder Was Designed by a Physician

Heimadal Security

First detected in February 2020, the Thanos ransomware was advertised for sale on dark web forums. Using a built-in constructor, the Thanos ransomware lets actors make changes to the sample according to their preferences. A Thanos version was used in assaults on two state-owned institutions in the Middle East and North Africa, which we think […].

article thumbnail

5 Things to know about the UK’s National Cyber Security Centre (NCSC)

The State of Security

#1 The history of the National Cyber Security Centre The UK’s first cybersecurity strategy was launched in 2009 and outlined that whatever the shape of the cybersecurity mission, it made no sense to silo it away from other aspects of national security. To be effective, it had to be able to take advantage of high-grade […]… Read More.

article thumbnail

BrandPost: DDos Extortion Takes VoIP Providers Offline

CSO Magazine

Threat actors are continually innovating and rethinking their attack patterns – as well as who they target with attacks. This is clearly seen in their targeting of Voice over Internet Protocol (VoIP) providers, as highlighted in NETSCOUT’s 2H 2021 Threat Report. Why target VoIP providers? The short answer is financial gain. Attackers know bringing down VoIP providers that service a large number of customers causes a lot of pain and therefore is ripe for extortion.

DDOS 109
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!