Fri.Apr 30, 2021

article thumbnail

Serious MacOS Vulnerability Patched

Schneier on Security

Apple just patched a MacOS vulnerability that bypassed malware checks. The flaw is akin to a front entrance that’s barred and bolted effectively, but with a cat door at the bottom that you can easily toss a bomb through. Apple mistakenly assumed that applications will always have certain specific attributes. Owens discovered that if he made an application that was really just a script—code that tells another program what do rather than doing it itself—and didn’t include a standard ap

Internet 290
article thumbnail

DigitalOcean admits data breach exposed customers’ billing details

Hot for Security

DigitalOcean, the popular cloud-hosting provider, has told some of its customers that their billing details were exposed due to what it described as a “flaw.” In an email sent out to affected users, DigitalOcean explained that an unauthorised party had managed to exploit the flaw to gain access to billing information between April 9 and April 22, 2021.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Suspected Chinese state hackers target Russian submarine designer

Bleeping Computer

Hackers suspected to work for the Chinese government have used a new malware called PortDoor to infiltrate the systems of an engineering company that designs submarines for the Russian Navy. [.].

article thumbnail

How to connect a client to the open-source Pritunl VPN

Tech Republic Security

Now that you have your Pritunl VPN server up and running, Jack Wallen shows you how to connect the client.

VPN 169
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Nitro Ransomware asks for Gift Cards as ransom

CyberSecurity Insiders

Nitro Ransomware, a new variant of file encrypting malware is shaking up the internet by demanding Discord Nitro Gift Cards from victims instead of cryptocurrency. Researchers from MalwareHunterTeam have discovered this activity and discovered that the distributors of this malware are giving only 3 hours to buy the gift card after which the stolen data will leaked to the internet.

article thumbnail

First Horizon bank online accounts hacked to steal customers’ funds

Bleeping Computer

Bank holding company First Horizon Corporation disclosed the some of its customers had their online banking accounts breached by unknown attackers earlier this month. [.].

Banking 144

More Trending

article thumbnail

Your stolen ParkMobile data is now free for wannabe scammers

Bleeping Computer

The account information for almost 22 million ParkMobile customers is now in the hands of hackers and scammers after the data was released for free on a hacking forum. [.].

article thumbnail

How Private Cloud Enables Data Security

Security Boulevard

Calling today’s modern business environment data-driven is stating the obvious. Data is at the core of most, if not every, business strategy, and for good reasons. Data allows leaders to base their decisions on facts, trends and statistics rather than gut feeling. But it’s more than just a tool to inform decision making; data is. The post How Private Cloud Enables Data Security appeared first on Security Boulevard.

article thumbnail

Previously undocumented backdoor targets Microsoft’s Equation Editor

CSO Magazine

Researchers from Cybereason Nocturnus Team have detected anomalous characteristics in a newly discovered RoyalRoad weaponizer that delivers a previously undocumented backdoor. The researchers have been tracking recent developments in the RoyalRoad when they uncovered an attack targeting a Russian-based defense contractor. [ Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. | Sign up for CSO newsletters. ].

CSO 129
article thumbnail

Research Shows Glaring Mobile App Security Issues

Security Boulevard

The COVID-19 pandemic has driven the world online in remarkable ways, forever changing the way we work, learn, and interact. The increased reliance on mobile applications is starkly apparent; mobile app usage grew 40% year-over-year in the second quarter of 2020, according to App Annie. In the recently released “Peril in a Pandemic: The State. The post Research Shows Glaring Mobile App Security Issues appeared first on Security Boulevard.

Mobile 127
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

China-linked APT uses a new backdoor in attacks at Russian defense contractor

Security Affairs

China-linked APT group targets Russian nuclear sub designer with an undocumented backdoor. A China-linked cyberespionage group targets a Russian defense contractor involved in designing nuclear submarines for the Russian Navy. Cybereason researchers reported that a China-linked APT group targets a Russian defense contractor involved in designing nuclear submarines for the Russian Navy.

Phishing 131
article thumbnail

Microsoft Warns 25 Critical Vulnerabilities in IoT, Industrial Devices

Threatpost

Azure Defender security team discovers that memory allocation is a systemic problem that can allow threat actors to execute malicious code remotely or cause entire systems to crash.

IoT 124
article thumbnail

The Week in Ransomware - April 30th 2021 - Attacks Escalate

Bleeping Computer

Ransomware gangs continue to target organizations large and small, including a brazen attack on the Washington DC police department. [.].

article thumbnail

Microsoft warns of damaging vulnerabilities in dozens of IoT operating systems

SC Magazine

A signage of Microsoft is seen on March 13, 2020 in New York City. The IoT security team at the Microsoft Security Response Center said vulnerabilities discovered affect at least 25 different products made by more than a dozen organizations, including Amazon, ARM, Google Cloud, Samsung, RedHat, Apache and others. (Jeenah Moon/Getty Images). Microsoft researchers have discovered multiple memory allocation and remote code execution vulnerabilities in the operating systems for a wide range of comme

IoT 120
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

HP CISO seeks to transform cybersecurity

CSO Magazine

HP CISO Joanna Burkey sees a pivot to business partnership as vital for cybersecurity’s success. Inspiring women to join the sector is essential to this shift.

CISO 125
article thumbnail

Hotbit cryptocurrency exchange down after hackers targeted wallets

Bleeping Computer

Cryptocurrency trading platform Hotbit has shut down all services for at least a week after a cyberattack that down several of its services on Thursday evening. [.].

article thumbnail

3 Ways to Keep Your Cryptocurrency Safe

Security Boulevard

Are you investing in cryptocurrency or thinking about it? Be sure to listen or watch our April monthly show for our top 3 ways to keep your cryptocurrency safe! ** Links mentioned on the show ** 10 Ways to Keep Your Cryptocurrency Safe [link] Beware of These Top Bitcoin Scams [link] 9 Best Crypto Wallets […]. The post 3 Ways to Keep Your Cryptocurrency Safe appeared first on The Shared Security Show.

article thumbnail

Hackers Exploit SonicWall Zero-Day Bug in FiveHands Ransomware Attacks

The Hacker News

An "aggressive" financially motivated threat group tapped into a zero-day flaw in SonicWall VPN appliances prior to it being patched by the company to deploy a new strain of ransomware called FIVEHANDS. The group, tracked by cybersecurity firm Mandiant as UNC2447, took advantage of an "improper SQL command neutralization" flaw in the SSL-VPN SMA100 product (CVE-2021-20016, CVSS score 9.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

BrandPost: Protecting 5G Networks Requires an Integrated, Holistic Security Approach

CSO Magazine

As the digital threat landscape expands and poses new security threats, organizations are turning to digital innovation to meet their rapidly changing security needs. Many organizations are adopting multiple digital innovations, including 5G. However, with the incorporation of new devices into their networks, they are also introducing more edges and expanding the attack surface, posing new cybersecurity risks for their organizations.

Risk 110
article thumbnail

Passwordstate Warns of Ongoing Phishing Attacks Following Data Breach

The Hacker News

Click Studios, the Australian software firm which confirmed a supply chain attack affecting its Passwordstate password management application, has warned customers of an ongoing phishing attack by an unknown threat actor.

Phishing 113
article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

Gregory Touhill, former federal chief information security officer and deputy assistant Homeland Security secretary for cyber security operations, seen here at a House Foreign Affairs Committee hearing in 2015 in Washington, DC. Touhill was named director of Carnegie Mellon University’s CERT in April. (Photo by Mark Wilson/Getty Images). On April 21, Gregory Touhill was named as the new director of the Computer Emergency Readiness Team at the Software Engineering Institute (SEI), a non-pro

CISO 109
article thumbnail

The Kubernetes Network Security Effect

Security Boulevard

I’m a firm believer that network security must be a layer in an overall security strategy. As cloud evolves, it’s hard not to notice the network security challenges in this domain. TL;DR: Kubernetes (K8s) has a built-in object (sort of) for managing network security (NetworkPolicy). While it allows the user to define the relationship between.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Babuk quits ransomware encryption, focuses on data-theft extortion

Bleeping Computer

A new message today from the operators of Babuk ransomware clarifies that the gang has decided to close the affiliate program and move to an extortion model that does not rely on encrypting victim computers. [.].

article thumbnail

Microsoft warns of BadAlloc flaws in OT, IoT devices

Security Affairs

Microsoft researchers are warning of major security vulnerabilities affecting OT and IoT devices and high-risks for businesses using them. Researchers from Microsoft’s Section 52 team recently uncovered several critical memory allocation flaws, collectively tracked as BadAlloc , affecting IoT and OT devices. The vulnerabilities could be exploited by attackers to bypass security controls to execute malicious code or trigger DoS conditions.

IoT 109
article thumbnail

Microsoft Finds 'BadAlloc' Flaws Affecting Wide-Range of IoT and OT Devices

The Hacker News

Microsoft researchers on Thursday disclosed two dozen vulnerabilities affecting a wide range of Internet of Things (IoT) and Operational Technology (OT) devices used in industrial, medical, and enterprise networks that could be abused by adversaries to execute arbitrary code and even cause critical systems to crash.

IoT 104
article thumbnail

UNC2447 cybercrime gang exploited SonicWall Zero-Day before it was fixed

Security Affairs

UNC2447 cybercrime gang exploited a zero-day in the Secure Mobile Access (SMA), addressed by SonicWall earlier this year, before the vendor released a fix. Researchers from FireEye’s Mandiant revealed that a sophisticated cybercrime gang tracked as UNC2447 has exploited a zero-day issue ( CVE-2021-20016 ) in SonicWall Secure Mobile Access (SMA) devices, fixed earlier this year, before the vendor addressed it.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Ransomware Task Force Publishes Framework to Fight Global Threat

Dark Reading

An 81-page report details how ransomware has evolved, along with recommendations on how to deter attacks and disrupt its business model.

article thumbnail

IoT riddled with BadAlloc vulnerabilities

Malwarebytes

The Cybersecurity and Infrastructure Security Agency (CISA) has published advisory ICSA-21-119-04 about vulnerabilities found in multiple real-time operating systems (RTOS) and supporting libraries. Those operating systems and libraries are widely used in smart, Internet-connected “things” The number of affected devices could be enormous.

IoT 98
article thumbnail

The Civilian Cybersecurity Reserve: A National Guard-like program to address growing cybersecurity vulnerabilities faced by the U.S. government

Security Boulevard

This would be like a Civilian Cybersecurity Reserve and it would be voluntary and by invitation only. This would allow our national security agencies to have access to the qualified, capable, and service-oriented American talent necessary to respond when an attack occurs. The post The Civilian Cybersecurity Reserve: A National Guard-like program to address growing cybersecurity vulnerabilities faced by the U.S. government appeared first on Security Boulevard.

article thumbnail

Ghost Town Security: What Threats Lurk in Abandoned Offices?

Dark Reading

Millions of office buildings and campuses were rapidly abandoned during the pandemic. Now it's a year later. What happened in those office parks and downtown ghost towns? What security dangers lurk there now, waiting to ambush returning businesses?

135
135
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.