Wed.Sep 09, 2020

article thumbnail

Backing up data is more important as people work from home during COVID-19

Tech Republic Security

TechRepublic writer Erik Eckel gives tips on how to make sure your data is safe if you're working from home.

187
187
article thumbnail

Netwalker ransomware hit K-Electric, the major Pakistani electricity provider

Security Affairs

K-Electric, the electricity provider for the city of Karachi, Pakistan, was hit by a Netwalker ransomware attack that blocked billing and online services. K-Electric, the electricity provider for Karachi (Pakistan) is another victim of the Netwalker ransomware gang, the infection disrupted billing and online services. K-Electric (KE) (formerly known as Karachi Electric Supply Company / Karachi Electric Supply Corporation Limited) is a Pakistani investor-owned utility managing all three key stage

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

First day of school shut down by ransomware attack in Connecticut

Tech Republic Security

Hartford Mayor Luke Bronin said the attackers did not make a specific ransom demand after shutting down systems for 40 schools.

article thumbnail

War of Linux Cryptocurrency Miners: A Battle for Resources

Trend Micro

This blog will discuss the ruthless battle for computing power among the different cryptocurrency-mining malware that target Linux systems. We also discuss the shifts in entry points that cover Docker environments and applications with open APIs.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Microsoft issues 129 security fixes as part of Patch Tuesday September

Tech Republic Security

This month's patch Tuesday includes patches for 15 Microsoft products, including 23 critical CVEs.

159
159
article thumbnail

Why We Need to Pay Attention to Attacks on the Smart-Built Environment

Dark Reading

Are attacks on IoT physical security devices real or just theoretical? Why professionals need to be aware of the real-life examples in an effort to guard against future attacks on their own businesses.

IoT 85

More Trending

article thumbnail

Ransomware Attacks Disrupt School Reopenings

Dark Reading

A flurry of recent attacks is complicating attempts to deliver classes online at some schools in different parts of the country.

article thumbnail

Spyware Labeled ‘TikTok Pro’ Exploits Fears of US Ban

Threatpost

Malware can take over common device functions as well as creates a phishing page to steal Facebook credentials.

Spyware 104
article thumbnail

Legality of Security Research to be Decided in US Supreme Court Case

Dark Reading

A ruling that a police officer's personal use of a law enforcement database is "hacking" has security researchers worried for the future.

Hacking 130
article thumbnail

Critical Flaws in 3rd-Party Code Allow Takeover of Industrial Control Systems

Threatpost

Researchers warn of critical vulnerabilities in a third-party industrial component used by top ICS vendors like Rockwell Automation and Siemens.

89
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Backing up data is more important as people work from home during COVID-19

Tech Republic Security

TechRepublic writer Erik Eckel gives tips on how to make sure your data is safe if you're working from home.

89
article thumbnail

Using OPA to safeguard Kubernetes

InfoWorld on Security

As more and more organizations move containerized applications into production, Kubernetes has become the de facto approach for managing those applications in private, public and hybrid cloud settings. In fact, at least 84% of organizations already use containers in production, and 78% leverage Kubernetes to deploy them, according to the Cloud Native Computing Foundation.

75
article thumbnail

Multiparty Encryption Allows Companies to Solve Security-Data Conundrum

Dark Reading

An interdisciplinary research team constructs a way for companies to share breach data without revealing specific details that could exposes businesses to legal risk.

article thumbnail

Google Squashes Critical Android Media Framework Bug

Threatpost

The September Android security bulletin addressed critical- and high-severity flaws tied to 53 CVEs overall.

Media 98
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Top 5 Identity-Centric Security Imperatives for Newly Minted Remote Workers

Dark Reading

In the wake of COVID-19, today's remote workforce is here to stay, at least for the foreseeable future. And with it, an increase in identity-related security incidents.

78
article thumbnail

Zeppelin Ransomware Returns with New Trojan on Board

Threatpost

The malware has popped up in a targeted campaign and a new infection routine.

article thumbnail

Chart: Does Lack of Diversity Impact the Skills Shortage?

Dark Reading

Yes, according to 21% of security pros who participated in the 2020 Black Hat Attendee Survey.

92
article thumbnail

NopSec Drives the Vulnerability Management Standards with Latest Release of Program Intelligence Module

NopSec

NopSec’s Vulnerability Risk Management Platform Enables Organizations to Better Manage Business Risk. New York, NY – NopSec,Inc. , a leader in vulnerability and cyber threat management, today announced that the Program Intelligence Module will extend the power of the Unified VRM , addressing additional use cases to strengthen the security posture of customers.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

7 Cybersecurity Priorities for Government Agencies & Political Campaigns

Dark Reading

As election season ramps up, organizations engaged in the process must strengthen security to prevent chaos and disorder from carrying the day. Here's how.

article thumbnail

Your AST Guide for the Disenchanted: Part 1

ForAllSecure

At ForAllSecure, we’ve observed an increasing uptick in organizations looking for alternatives to mainstream application security tools. Why? Organizations are finding that today’s AST tools aren’t servicing their objectives to develop software faster and deploy frequently. In this blog series, we’ll chronicle the top challenges of incorporating application security testing in DevOps workflows.

article thumbnail

Meet the Middlemen Who Connect Cybercriminals With Victims

Dark Reading

An analysis of initial access brokers explains how they break into vulnerable organizations and sell their access for up to $10,000.

75
article thumbnail

US Space Cybersecurity Directive

Schneier on Security

The Trump Administration just published “ Space Policy Directive – 5 “: “Cybersecurity Principles for Space Systems.” It’s pretty general: Principles. (a) Space systems and their supporting infrastructure, including software, should be developed and operated using risk-based, cybersecurity-informed engineering. Space systems should be developed to continuously monitor, anticipate,and adapt to mitigate evolving malicious cyber activities that could manipulate,

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Inova Suffers Third-Party Data Breach

Dark Reading

The breach occurred as part of a ransomware attack against service provider Blackbaud.

article thumbnail

A DHS Official Says He Was Punished for Not Pushing Trump's Agenda

WIRED Threat Level

Brian Murphy says he was pressured to alter reports on Russia and white supremacy—and that he was fired for refusing to budge.

100
100
article thumbnail

Gone in a Flash

Dark Reading

Behold, the pitfalls of portable hardware.

90
article thumbnail

Trump Administration Establishes Cybersecurity Principles for Space Systems

SecureWorld News

President Trump recently signed a Space Policy Directive (SPD) to protect American space systems from cyber threats. At first glance, you might read cyber threats in space and think, "What, space cyber threats? Are we talking aliens?" No, the answer is not aliens. These threats are coming from our home planet, and they are indeed very real. Why does cybersecurity in space matter?

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Secureworks to Buy Delve Laboratories for Vulnerability Management

Dark Reading

Delve's automated vulnerability platform provides insight on high-risk vulnerabilities across an organization's network, endpoints, and cloud.

Risk 57
article thumbnail

Our Diversity Program Isn't Working. What Are We Doing Wrong?

Dark Reading

Assuming that you're truly stuck, here are some things to consider.

65