Tue.Jul 25, 2023

article thumbnail

Who and What is Behind the Malware Proxy Service SocksEscort?

Krebs on Security

Researchers this month uncovered a two-year-old Linux-based remote access trojan dubbed AVrecon that enslaves Internet routers into botnet that bilks online advertisers and performs password-spraying attacks. Now new findings reveal that AVrecon is the malware engine behind a 12-year-old service called SocksEscort , which rents hacked residential and small business devices to cybercriminals looking to hide their true location online.

Malware 244
article thumbnail

New York Using AI to Detect Subway Fare Evasion

Schneier on Security

The details are scant—the article is based on a “heavily redacted” contract—but the New York subway authority is using an “AI system” to detect people who don’t pay the subway fare. Joana Flores, an MTA spokesperson, said the AI system doesn’t flag fare evaders to New York police, but she declined to comment on whether that policy could change.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Create a Custom Security & Threat Dashboard in Power BI

Tech Republic Security

Want a custom security dashboard to bring together data from multiple places? Microsoft Power BI can do that and help you spot what's changing.

Big data 206
article thumbnail

60,000 Androids have stalkerware-type app Spyhide installed

Malwarebytes

Stalkerware-type app Spyhide is coded so badly that it’s possible to gain access to the back-end databases and retrieve data about everyone that has the app on their device. And it's not a small number. Hacktivist maia arson crimew told TechCrunch she'd found 60,000 compromised Android devices, dating back to 2016. Spyhide, like many other stalkerware-type apps “silently and continually uploads the phone’s contacts, messages, photos, call logs and recordings, and granular locat

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Checklist: Securing Digital Information

Tech Republic Security

Digital information is generally the lifeblood of any given organization, containing essential company data needed to run the business. Paperless offices have become the norm across industries and remote work depends on the ability to share electronic information for communication, announcements and collaboration. This checklist from TechRepublic Premium provides a strategy for implementing the maximum.

Big data 158
article thumbnail

FraudGPT Follows WormGPT as Next Threat to Enterprises

Security Boulevard

Less than two weeks after WormGPT hit the scene as threat actors’ alternative to the wildly popular ChatGPT generative AI chatbot, a similar tool called FraudGPT is making the rounds on the dark web. FraudGPT offers cybercriminals more effective ways to launch phishing attacks and create malicious code. FraudGPT has been circulating on Telegram Channels.

LifeWorks

More Trending

article thumbnail

VMware addressed an information disclosure flaw in VMware Tanzu Application Service for VMs and Isolation Segment

Security Affairs

VMware fixed an information disclosure flaw in VMware Tanzu Application Service for VMs and Isolation Segment that exposed CF API admin credentials in audit logs. VMware has addressed an information disclosure vulnerability, tracked as CVE-2023-20891 (CVSSv3 score 6.5), in VMware Tanzu Application Service for VMs (TAS for VMs) and Isolation Segment that exposed logged credentials via system audit logs.

Hacking 98
article thumbnail

Netskope Sees Lots of Source Code Pushed in ChatGPT

Security Boulevard

Netskope today published a report that found source code is posted to ChatGPT more than any other type of sensitive data. The post Netskope Sees Lots of Source Code Pushed in ChatGPT appeared first on Security Boulevard.

article thumbnail

Atlassian addressed 3 flaws in Confluence and Bamboo products

Security Affairs

Atlassian addressed three vulnerabilities in its Confluence Server, Data Center, and Bamboo Data Center products that can lead to remote code execution. Atlassian has addressed three critical and high severity vulnerabilities impacting the Confluence Server, Data Center, and Bamboo Data Center products. Successful exploitation of the vulnerabilities could result in remote code execution on vulnerable systems.

article thumbnail

Zenbleed: New Flaw in AMD Zen 2 Processors Puts Encryption Keys and Passwords at Risk

The Hacker News

A new security vulnerability has been discovered in AMD's Zen 2 architecture-based processors that could be exploited to extract sensitive data such as encryption keys and passwords. Discovered by Google Project Zero researcher Tavis Ormandy, the flaw – codenamed Zenbleed and tracked as CVE-2023-20593 (CVSS score: 6.5) – allows data exfiltration at the rate of 30 kb per core, per second.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Yamaha Confirms Cyber Attack on Its Canadian Division

Heimadal Security

Yamaha’s Canadian music division has confirmed that it fell victim to a recent cyberattack, as two separate ransomware groups claimed responsibility for targeting the company. Yamaha Corporation, a renowned Japanese manufacturer of musical instruments and audio equipment, experienced unauthorized access and data theft during the cyberattack. In response, the company swiftly took action to contain […] The post Yamaha Confirms Cyber Attack on Its Canadian Division appeared first on Hei

article thumbnail

Critical MikroTik RouterOS Vulnerability Exposes Over Half a Million Devices to Hacking

The Hacker News

A severe privilege escalation issue impacting MikroTik RouterOS could be weaponized by remote malicious actors to execute arbitrary code and seize full control of vulnerable devices. Cataloged as CVE-2023-30799 (CVSS score: 9.

Hacking 98
article thumbnail

What Is Green Development? How NGOs Can Assist

SecureBlitz

You should consider something like the implicit green tone or perhaps painting a structure with a green tone? In no way, shape, or form. Green development is a lot more extensive than it looks. It is almost certain the way things are assembled or built. Green development can be characterized as the way of thinking […] The post What Is Green Development?

article thumbnail

Casbaneiro Banking Malware Goes Under the Radar with UAC Bypass Technique

The Hacker News

The financially motivated threat actors behind the Casbaneiro banking malware family have been observed making use of a User Account Control (UAC) bypass technique to gain full administrative privileges on a machine, a sign that the threat actor is evolving their tactics to avoid detection and execute malicious code on compromised assets.

Banking 98
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

What is Incident Response? Ultimate Guide + Templates

eSecurity Planet

Incident Response is a systematic method for addressing and managing security incidents in organizations, focused on minimizing and investigating the impact of events and restoring normal operations. When an incident is spotted, typically by an alert or observation, response teams swing into action to address any damage and prevent it from spreading.

article thumbnail

Shifting the Cybersecurity Paradigm: Embracing a Prevention-First Strategy

Security Boulevard

A recent article in Forbes discusses the shifting mindset in cybersecurity from the traditional “detect and respond” approach to a prevention-first philosophy. With the continuous evolution of cybersecurity threats, organizations are investing in various tools like EDR (endpoint detection and response), MDR (managed detection and response), and XDR (extended detection and response).

article thumbnail

ChatGPT Has a Plugin Problem

WIRED Threat Level

Third-party plugins boost ChatGPT’s capabilities. But security researchers say they add an extra layer of risk.

Risk 98
article thumbnail

Cyber Insurance: The Key to Business Resilience in a Risky World

Security Boulevard

Picture this: your company falls victim to a cyber-attack, resulting in loss of revenue and significant operational downtime. Do you know what your next steps should be? The post Cyber Insurance: The Key to Business Resilience in a Risky World appeared first on Security Boulevard.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

In Response to Widespread Attacks Heimdal Offers Free Ransomware Protection to NHS Trusts

Heimadal Security

Heimdal is offering NHS Trusts free ransomware protection licenses to tackle the rising wave of cyber-attacks. The public sector’s battle with bad actors escalated this month when the UK’s largest NHS trust confirmed a ransomware incident. We’re proactively helping the NHS limit reduce the likelihood of future attacks. Heimdal CEO Morten Kjaersgaard says, “Our NHS […] The post In Response to Widespread Attacks Heimdal Offers Free Ransomware Protection to NHS Trusts appeared first on Heimda

article thumbnail

Seven Common Lateral Movement Techniques

Security Boulevard

Inside the Attacker’s Playbook: Unmasking the most common lateral movement techniques Lateral movement techniques refer to the methods employed by attackers to move through a network, seeking to escalate privileges, access sensitive data, or achieve persistence. A common and insidious practice, making the most of the common lateral movement techniques is the bread and butter.

98
article thumbnail

macOS Under Attack: Examining the Growing Threat and User Perspectives

The Hacker News

As the number of people using macOS keeps going up, so does the desire of hackers to take advantage of flaws in Apple's operating system. What Are the Rising Threats to macOS? There is a common misconception among macOS fans that Apple devices are immune to hacking and malware infection. However, users have been facing more and more dangers recently.

Malware 98
article thumbnail

Patch Now: Up to 900K MikroTik Routers Vulnerable to Total Takeover

Dark Reading

Researchers have delivered working exploits for RouterOS, which when combined with default admin passwords can be a recipe for cyber disaster.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

DOJ Reorganizes Units to Better Fight Ransomware

Security Boulevard

The DOJ’s two-year-old National Cryptocurrency Enforcement Team (NCET) will merge with its Crime and Intellectual Property Section (CCIPS). The post DOJ Reorganizes Units to Better Fight Ransomware appeared first on Security Boulevard.

article thumbnail

MobileIrony backdoor allows complete takeover of mobile security product and endpoints.

DoublePulsar

MobileIron aka EPMM, a widely used Mobile Device Management product from Ivanti, has a crucial flaw — it has an API endpoint which requires no authentication whatsoever. Ivanti customers should patch this zero day now. It became clear this was being exploited in the wild a few days ago, after the Norwegian government disclosed 12 of their ministries were hacked using this MobileIron zero day , and they had to tell Ivanti about the issue.

Mobile 98
article thumbnail

No net for some, no root for devs — Google pilot walls off staff internet, access for ‘safety’

Security Boulevard

Google employees are to be protected from themselves. In what’s being described as a pilot program, they’ll lose internet access at work and/or root privileges. The post No net for some, no root for devs — Google pilot walls off staff internet, access for ‘safety’ appeared first on Security Boulevard.

article thumbnail

What Is Mobile Device Management? Role in Endpoint Security and Benefits

Heimadal Security

Mobile device management (MDM) is software that enables IT teams to supervise and secure all mobile endpoints in a company`s digital perimeter: laptops, tablets, smartphones, etc. In the age of remote & hybrid work, an MDM strategy is an essential component of endpoint security. By using a Mobile Device Management solution, IT administrators can track […] The post What Is Mobile Device Management?

Mobile 98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Super Admin elevation bug puts 900,000 MikroTik devices at risk

Bleeping Computer

A critical severity 'Super Admin' privilege elevation flaw puts over 900,000 MikroTik RouterOS routers at risk, potentially enabling attackers to take full control over a device and remain undetected. [.

Risk 97
article thumbnail

Lazarus APT Group Targets Windows IIS Web Servers to Distribute Malware

Heimadal Security

Recently, cybersecurity specialists made a concerning discovery regarding the North Korean state-sponsored Lazarus APT group. The ASEC team found that the group is actively targeting Windows Internet Information Service (IIS) web servers as a means to distribute malware. Lazarus employs a tactic known as the “watering hole” technique to gain initial access.

Malware 97
article thumbnail

NimiTV Transfers Recordings from the Bank of the Adriatic and Ionian Oceans

SecureBlitz

NimiTV is a video real time stage that distributes Albanian substance and conveys it to watchers in Europe, New Zealand, and Australia. It brings many highlights to the table for its clients that we are investigating in this article. We should start. What is the big deal about NimiTV? There are a great deal of […] The post NimiTV Transfers Recordings from the Bank of the Adriatic and Ionian Oceans appeared first on SecureBlitz Cybersecurity.

Banking 97
article thumbnail

EasyDMARC Recognized As “Top Solution” Summer 2023 by Expert Insights

Security Boulevard

July 25, 2023 – Expert Insights, a renowned. The post EasyDMARC Recognized As “Top Solution” Summer 2023 by Expert Insights appeared first on EasyDMARC. The post EasyDMARC Recognized As “Top Solution” Summer 2023 by Expert Insights appeared first on Security Boulevard.

97
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!