Wed.Sep 01, 2021

article thumbnail

Zero-Click iPhone Exploits

Schneier on Security

Citizen Lab is reporting on two zero-click iMessage exploits, in spyware sold by the cyberweapons arms manufacturer NSO Group to the Bahraini government. These are particularly scary exploits, since they don’t require to victim to do anything, like click on a link or open a file. The victim receives a text message, and then they are hacked. More on this here.

Spyware 282
article thumbnail

15-Year-Old Malware Proxy Network VIP72 Goes Dark

Krebs on Security

Over the past 15 years, a cybercrime anonymity service known as VIP72 has enabled countless fraudsters to mask their true location online by routing their traffic through millions of malware-infected systems. But roughly two weeks ago, VIP72’s online storefront — which ironically enough has remained at the same U.S.-based Internet address for more than a decade — simply vanished.

Malware 274
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fired NY credit union employee nukes 21GB of data in revenge

Bleeping Computer

Juliana Barile, the former employee of a New York credit union, pleaded guilty to accessing the financial institution's computer systems without authorization and destroying over 21 gigabytes of data in revenge. [.].

145
145
article thumbnail

Microsoft’s Opportunity to Reinvigorate Security Leadership

Security Boulevard

The White House-hosted cybersecurity summit on August 25, 2021 was an opportunity for representatives from the private and public sectors to discuss how they can collaborate to address pressing information and computer security issues. Many of the leading technology companies, such as Amazon, Google, IBM and Microsoft, made commitments to expand cybersecurity funding and to.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Microsoft: Windows Server 2022 is now generally available

Bleeping Computer

Microsoft has announced that Window Server 2022, a Long Term Servicing Channel (LTSC) release with ten years of support, is generally available starting today. [.].

Software 141
article thumbnail

Google Play sign-ins can be abused to track another person’s movements

Malwarebytes

Even people that have been involved in cybersecurity for over 20 years make mistakes. I’m not sure whether that is a comforting thought for anyone or whether everyone should be worried now. But it is what it is and I make it a habit of owning my mistakes. So here goes. With the aid of Google I was able to “spy” on my wife’s whereabouts without having to install anything on her phone.

More Trending

article thumbnail

Unpatched Exchange Servers an overlooked risk

CSO Magazine

The US Cybersecurity and Infrastructure Security Agency (CISA) has started a list of what it deems to be bad security practices. The two on the list so far instruct any organization that provides national critical functions (NCF) what not to do. They are so broad in their “badness,” however, that any organization should take notice and ensure they are not doing them.

CSO 127
article thumbnail

LockBit gang leaks Bangkok Airways data, hits Accenture customers

Bleeping Computer

Bangkok Airways, a major airline company in Thailand, confirmed it was the victim of a cyberattack earlier this month that compromised personal data of passengers. [.].

132
132
article thumbnail

Cyber Attack leads to data breach of Britain’s Gun Enthusiasts

CyberSecurity Insiders

A report published in ‘The Register’ states that information related to Britain’s gun enthusiasts was leaked in a sophisticated cyber attack targeted a few weeks ago leading to the exposure of sensitive details such as home addresses, contact details and names of over 111,295 people holding license to own and operate a gun. National Crime Agency officials have been assigned the task to investigate the incident that took place on the servers of ‘Gun Trader’ platform which has reportedly kept a re

article thumbnail

Microsoft kicks unsupported PCs out of Windows 11 preview program

Bleeping Computer

Microsoft is kicking unsupported Windows 11 devices out of the Windows 11 preview program without warning, even though it said that wouldn't happen until the new Windows version was released. [.].

128
128
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to Recover Your Gmail, Yahoo, Microsoft, Facebook, Twitter or Instagram Account

Heimadal Security

So you got hacked or forgot your login credentials and lost access to your email or social media account. What now? First, let’s start with what you shouldn’t do: panic. You’re not the first person to go through this, and you will not be the last. Big companies know this and have come up with ways […]. The post How to Recover Your Gmail, Yahoo, Microsoft, Facebook, Twitter or Instagram Account appeared first on Heimdal Security Blog.

article thumbnail

Interesting as Cyber Attack victim sues hackers parents

CyberSecurity Insiders

In January 2018, a man named Andrew Schober was busy moving $800k worth currency in Bitcoins from one virtual wallet to other. However, he failed in doing so, as some hackers tried to intercept the transaction and somehow diverted the funds to their personal wallets. Andrew contacted the wallet companies to track down the culprits, but in vain. So, he contacted some private investigators by spending $10,000 to discover those behind the cyber incident that stole almost his life’s earnings.

article thumbnail

LockBit ransomware operators leak 200GB of data belonging to Bangkok Airways

Security Affairs

LockBit ransomware operators have breached Bangkok Airways, the airline confirmed it was the victim and discloses a data breach impacting its passengers. Bangkok Airways, a regional airline based in Bangkok, discloses a data breach as a result of a ransomware attack orchestrated by the LockBit ransomware operators. The ransomware gang had posted a message on their leak site claiming to have breached the airline and threatening to leak stolen data if the company will not pay the ransom.

article thumbnail

Twitter adds Safety Mode to automatically block online harassment

Bleeping Computer

Twitter has introduced today Safety Mode, a new feature that aims to block online harassment attempts and reduce disruptive interactions on the platform. [.].

124
124
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Watch out, ransomware attack risk increases on holidays and weekends, FBI and CISA

Security Affairs

The FBI and CISA issued a joint cybersecurity advisory to warn organizations to remain vigilant against ransomware attacks during weekends or holidays. The FBI and CISA warn organizations to keep high their defenses against ransomware attacks during weekends or holidays. The government agencies have observed an increase in ransomware attacks occurring on holidays and weekends, the choice of these period is motivated by the lower level of defense due to the reduced presence of the personnel. R

article thumbnail

Ransomware attacks on schools fetched $6 Billion loss

CyberSecurity Insiders

According to a report compiled by Comparitech, Ransomware Attacks on schools and colleges operating in United States could have fetched a $6 billion loss to the institutes on a combined note in 2020 alone. The only good news is that the research team found that the average downtime was witnessed to have decreased from 14 days to 7 days, while the recovery time improved from 73.8 days to 55.4 days.

article thumbnail

Adequacy Decisions in the UK

TrustArc

Adequacy decisions are the easiest way to transfer personal data out of the EU. Once the European Commission has determined the level of protection in a country or region is essentially equivalent to European standards, data can flow freely without any prior authorizations or specific contractual requirements. In the case of the United Kingdom, almost […].

115
115
article thumbnail

Cyber Threat to Labor Day Weekend

CyberSecurity Insiders

FBI and CISA on a joint note issued a public alert that computer networks of government and corporate companies were on the verge of being targeted by a cyber attack on this coming Labor Day weekend, i.e on September 6th of 2021. So, companies are being urged to step-up their security of systems proactively to safeguard their IT Infrastructure from potential data breaches from cyber attacks.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Windows Terminal now lets you drag and drop folders to open tabs

Bleeping Computer

Microsoft released Windows Terminal Preview v1.11 yesterday, and comes numerous improvements and features, including the ability to open a Terminal window by dropping a folder on the new tab button. [.].

112
112
article thumbnail

What is 5G shared responsibility and how would it work?

CyberSecurity Insiders

5G is fundamentally different from anything we’ve ever seen. By 2023, the new technology is predicted to host 25 billion device connections , jumping to 75 billion by 2025. That’s more than 9 devices per person on earth. . 5G offers more than just the ability to see videos faster. Compared to 4G, it offers a higher transmission speed, lower latency and increased bandwidth. .

article thumbnail

Top 8 Recent Cyber Attacks on Government Institutions Worldwide

Security Boulevard

Government organizations worldwide are at risk online. In this era of digitization, cyber criminals are more empowered than ever, leaving governments around the globe on unsure footing. Government entities globally have become one of the most popular targets amongst threat actors. With different economic and political motivations, cyber criminals have targeted several government institutions over […].

article thumbnail

Cybercriminals Abusing Internet-Sharing Services to Monetize Malware Campaigns

The Hacker News

Threat actors are capitalizing on the growing popularity of proxyware platforms like Honeygain and Nanowire to monetize their own malware campaigns, once again illustrating how attackers are quick to repurpose and weaponize legitimate platforms to their advantage.

Internet 110
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Best Practices for Cybersecurity Performance Management

Security Boulevard

If you’re a cybersecurity professional, there might be three things keeping you awake at night: The job is getting busier and harder as threat of a breach is ever increasing You’re working too hard and burnout is prevalent in the industry You’ve got no means of demonstrating the results of your hard work and therefore. The post Best Practices for Cybersecurity Performance Management appeared first on Security Boulevard.

article thumbnail

Feds Warn of Ransomware Attacks Ahead of Labor Day

Threatpost

Threat actors recently have used long holiday weekends -- when many staff are taking time off -- as a prime opportunity to ambush organizations.

article thumbnail

Bitglass Security Spotlight: Details on the T-Mobile Hack, DDoS Attacks, and Other Breaches

Security Boulevard

Here are the top security stories from recent weeks: . T-Mobile Hacker Brute-Forced Way Through Company Network. Boston Public Library Victim of Cyberattack that Resulted in System-wide Outage. Ragnarok Ransomware Group Shuts Down, Releases Master Decryption Keys. Microsoft Power Apps Portals Exposes 38 Million Sensitive Data Records. Cloudflare Stops Largest Reported DDoS Attack.

DDOS 104
article thumbnail

Citrix Vulnerability leads to Cyber Attack on US Census Database   

CyberSecurity Insiders

According to a media update released by US Census Bureau, hackers launched a cyber attack on the website database in January 2020 with an intention to access or steal data. However, the IT staff of the government organization took control of the situation and blocked the access and the malicious intentions before any serious incident took place. The Census Bureau issued an update that the attack took place as hackers tried their best to exploit a Citrix Vulnerability to remotely execute a malici

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Macs turn on apps signed by Symantec, treat them as malware

Malwarebytes

On August 23, following an update to Apple’s XProtect system—one of the security features built into macOS—some Mac users began to see security alerts about some of their apps, claiming that they “will damage your computer,” and offering users the option to “report malware to Apple.” This has led to much confusion online, and to an influx of requests in our support system asking about this malware.

Malware 103
article thumbnail

BEC Scammers Seek Native English Speakers on Underground

Threatpost

Cybercrooks are posting help-wanted ads on dark web forums, promising to do the technical work of compromising email accounts but looking for native English speakers to carry out the social-engineering part of these lucrative scams.

article thumbnail

QNAP Working on Patches for OpenSSL Flaws Affecting its NAS Devices

The Hacker News

Network-attached storage (NAS) appliance maker QNAP said it's currently investigating two recently patched security flaws in OpenSSL to determine their potential impact, adding it will release security updates should its products turn out to be vulnerable. Tracked as CVE-2021-3711 (CVSS score: 7.5) and CVE-2021-3712 (CVSS score: 4.

99
article thumbnail

Best Home Security Cameras According To Reddit Users

SecureBlitz

Are you on this page for the best home security cameras Reddit? Yes, you just landed on the right page. Although, this website may not be the Reddit forum, but it is the better option for you. Why? Because the home security cameras discussed on this page were selected by experts who went on Reddit. The post Best Home Security Cameras According To Reddit Users appeared first on SecureBlitz Cybersecurity.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.