Thu.Dec 08, 2022

article thumbnail

Leaked Signing Keys Are Being Used to Sign Malware

Schneier on Security

A bunch of Android OEM signing keys have been leaked or stolen, and they are actively being used to sign malware. Łukasz Siewierski, a member of Google’s Android Security Team, has a post on the Android Partner Vulnerability Initiative (AVPI) issue tracker detailing leaked platform certificate keys that are actively being used to sign malware.

Malware 343
article thumbnail

New Ransom Payment Schemes Target Executives, Telemedicine

Krebs on Security

Ransomware groups are constantly devising new methods for infecting victims and convincing them to pay up, but a couple of strategies tested recently seem especially devious. The first centers on targeting healthcare organizations that offer consultations over the Internet and sending them booby-trapped medical records for the “patient.” The other involves carefully editing email inboxes of public company executives to make it appear that some were involved in insider trading.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Here’s how and why ‘trust’ presents an existential threat to cybersecurity

The Last Watchdog

Over the years, bad actors have started getting more creative with their methods of attack – from pretending to be a family member or co-worker to offering fortunes and free cruises. Related: Deploying employees as human sensors. Recent research from our team revealed that while consumers are being exposed to these kinds of attacks (31 percent of respondents reported they received these types of messages multiple times a day), they continue to disregard cyber safety guidelines.

article thumbnail

Explorations in the spam folder–Holiday Edition

Cisco Security

Watch ThreatWise TV: Explorations in the spam folder. The spam folder: that dark and disregarded corner of every email account, full of too-good-to-be-true offers, unexpected shipments, and supposedly free giveaways. You’re right to ignore this folder; few good things come from exploring it. But every once in a while one of these misleading, and sometimes malicious, emails manages to evade the filters that normally siphon them off, landing them in your inbox instead.

Scams 145
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Zero-Day Flaws Found in Several Leading EDR, AV Solutions

eSecurity Planet

SafeBreach Labs researcher Or Yair has uncovered zero-day vulnerabilities in several leading endpoint detection and response ( EDR ) and antivirus ( AV ) solutions that enabled him to turn the tools into potentially devastating next-generation wipers. “This wiper runs with the permissions of an unprivileged user yet has the ability to wipe almost any file on a system, including system files, and make a computer completely unbootable,” Yair warned in a blog post detailing the findings

Antivirus 142
article thumbnail

Report: Air-Gapped Networks Vulnerable to DNS Attacks

Dark Reading

Common mistakes in network configuration can jeopardize the security of highly protected assets and allow attackers to steal critical data from the enterprise.

DNS 132

LifeWorks

More Trending

article thumbnail

French Brand Intersport Hit by Ransomware Group Hive

Heimadal Security

Sports goods maker Intersport has been hit by the notorious ransomware group Hive, which leaked records of its customers’ personal data, as per French-language media outlet Numerama. The breach allegedly happened in November, with details made available only on the dark web. What Information Leaked? Passports, paystubs, and other details on Intersport customers are included […].

article thumbnail

Android app with over 5m downloads leaked user browsing history

Security Affairs

The Android app Web Explorer – Fast Internet left an open instance, exposing a trove of sensitive data that malicious actors could use to check specific users’ browsing history. Original post at [link]. A browsing app for Android devices, Web Explorer – Fast Internet, left open its Firebase instance, exposing app and user data, the Cybernews research team has discovered.

Internet 120
article thumbnail

Cybercriminals Attacking Each Other Gives Defenders Access to Inside Info

Heimadal Security

Researchers discovered a new sub-economy linked to cybercriminal activity: hackers scamming each other for millions of dollars. This practice led to the apparition of arbitration rooms in forums to settle conflicts. And these rooms proved to be full of valuable information for cybersecurity experts about threat actors and their tools. Details About the Findings To […].

Scams 105
article thumbnail

Zombinder APK binding service used in multiple malware attacks

Security Affairs

Zombinder is a third-party service on darknet used to embed malicious payloads in legitimate Android applications. While investigating a new malware campaign targeting Android and Windows systems, researchers at Threat Fabric discovered a darknet service, dubbed Zombinder, used to embed malicious payloads in legitimate Android apps. The campaign involved the Ermac Android banking Trojan along with desktop malware such as Erbium , Aurora stealer , and the Laplas “clipper”.

Malware 118
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

North Korean hackers exploit Seoul Halloween tragedy in zero-day attack

Graham Cluley

Malicious hackers, hell-bent on infiltrating an organisation, have no qualms about exploiting even the most tragic events. Read more in my article on the Tripwire State of Security blog.

Internet 104
article thumbnail

Hackers target Qatar FIFA Worldcup Football 2022

CyberSecurity Insiders

FIFA World Cup Football 2022 that is being held in Qatar is in news for being cyber attacked. According to some confirmed sources, the digital assaults were being witnessed right from the day of the opening ceremony and have increased by many folds since then. First, the target was a third party that was looking into the decoding service. Reports are in that two servers managing decoding process were disrupted at the beginning of the event.

article thumbnail

Apple's New Advanced Security Features Protect Your Sensitive Data

SecureWorld News

Apple has announced several new advanced security features that will provide users with important tools to protect their most sensitive data and communications. These features include iMessage Contact Key Verification, Security Keys for Apple ID, and Advanced Data Protection for iCloud. One of the most exciting new security features is iMessage Contact Key Verification.

article thumbnail

Fake encryption claims in chats leads to Criminals Arrest

CyberSecurity Insiders

To all those who are using various communication platforms with a thought that they are encrypted and so are free from prying eyes, here’s a news piece that needs your attention. It is not true that all communication platforms with such encryption claims are operating in-real as said. One such platform is ‘Encrochat’, the one that was used in the UK till 2020.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Metaparasites: The cybercriminals who rip each other off

Graham Cluley

Researchers at Sophos have investigated so-called "metaparasites" - the scammers who scam other scammers.

Scams 102
article thumbnail

3 Ways Attackers Bypass Cloud Security

Dark Reading

At Black Hat Europe, a security researcher details the main evasion techniques attackers are currently using in the cloud.

102
102
article thumbnail

APT37 used Internet Explorer Zero-Day in a recent campaign

Security Affairs

Google warns that the North Korea-linked APT37 group is exploiting Internet Explorer zero-day flaw to spread malware. North Korea-linked APT37 group (aka ScarCruft , Reaper, and Group123) actively exploited an Internet Explorer zero-day vulnerability, tracked as CVE-2022-41128 , in attacks aimed at South Korean users. Google Threat Analysis Group researchers discovered the zero-day vulnerability in late October 2022, it was exploited by APT37 using specially crafted documents.

Internet 100
article thumbnail

Best VPN Deals For Christmas 2022

SecureBlitz

Want the best VPN deals for Christmas 2022? Read on! Christmas is here again, and, as usual, it’s a great time to go shopping. You always get lots of amazing deals and discounts while this jolly season lasts. Not just offline, but also online, and among them are VPN offers. This is why we at […]. The post Best VPN Deals For Christmas 2022 appeared first on SecureBlitz Cybersecurity.

VPN 100
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Pwn2Own Toronto 2022 Day 2: Participants earned $281K

Security Affairs

Pwn2Own Toronto 2022 Day Two – Participants demonstrated exploits for smart speaker, smartphone, printer, router, and NAS. On the first day of the Zero Day Initiative’s Pwn2Own Toronto 2022 hacking competition participants earned $400,000 for 26 unique zero-day exploits. On the second day of the competition, participants earned more $281,000 for smart speaker, smartphone, printer, router, and NAS exploits.

Hacking 100
article thumbnail

Elon Musk’s Twitter Files Are a Feast for Conspiracy Theorists

WIRED Threat Level

From QAnon influencers to @catturd, the very online right sees exactly what they want to see in the CEO’s orchestrated disclosure.

99
article thumbnail

New Google Chrome feature frees memory to make browsing smoother

Bleeping Computer

Google says the latest release of Chrome for desktop devices now comes with a new performance-boosting feature designed to free up memory and make web browsing smoother. [.].

99
article thumbnail

COVID-bit: New COVert Channel to Exfiltrate Data from Air-Gapped Computers

The Hacker News

An unconventional data exfiltration method leverages a previously undocumented covert channel to leak sensitive information from air-gapped systems. "The information emanates from the air-gapped computer over the air to a distance of 2 m and more and can be picked up by a nearby insider or spy with a mobile phone or laptop," Dr.

Mobile 99
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Apple's AirTag stalker safeguards are "woefully inadequate," alleges lawsuit

Malwarebytes

Two women filed a proposed class-action lawsuit on Monday, December 5, in the United States District Court for the Northern District of California against Apple, the makers of AirTags. Airtags are a small Bluetooth-enabled devices designed to track personal belongings. The suit accuses the company of failure to introduce measures to combat abuse of the technology as stalkers have and continue to use AirTags to track people.

Media 98
article thumbnail

MuddyWater Hackers Target Asian and Middle East Countries with Updated Tactics

The Hacker News

The Iran-linked MuddyWater threat actor has been observed targeting several countries in the Middle East as well as Central and West Asia as part of a new spear-phishing activity. "The campaign has been observed targeting Armenia, Azerbaijan, Egypt, Iraq, Israel, Jordan, Oman, Qatar, Tajikistan, and the United Arab Emirates," Deep Instinct researcher Simon Kenin said in a technical write-up.

article thumbnail

Apple announces 3 new security features

Malwarebytes

Apple has announced three new security features focused on protecting user data in the cloud: iMessage Contact Key Verification, Security Keys for Apple ID, and Advanced Data Protection for iCloud. iMessage Contact Key Verification and Security Keys for Apple ID will be available globally in 2023. Advanced Data Protection for iCloud is available in the US today for members of the Apple Beta Software Program, and will be available to US users by the end of the year.

Backups 98
article thumbnail

Heimdal® Threat Prevention Recognized in GetApp’s Category Leaders Cybersecurity Report

Heimadal Security

Copenhagen, December 8th, 2022 – Heimdal® Threat Prevention has been placed on GetApp’s newly released Category Leaders Report for Cybersecurity, a free online service that helps organizations find the right software. Category Leaders are designed to help small businesses evaluate which software products may be right for them. Category Leaders is published on GetApp, the […].

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

9 online scams to watch out for this holiday season

Security Boulevard

The holiday season is upon us, and that means it's time to start shopping for gifts. But it's not just the hustle and bustle of the holiday season that you need to be aware of; there are also online scams that target unsuspecting consumers. Whether you're shopping online or browsing social media, understanding these 9 common online scams can help keep your family safe this holiday season. .

Scams 98
article thumbnail

Rackspace confirms it suffered a ransomware attack

Malwarebytes

It's not been a great week for cloud computing service provider Rackspace. On December 2, customers began experiencing problems connecting and logging into their Exchange environments. Rackspace started investigating and discovered an issue that affected its Hosted Exchange environments. Now Rackspace has announced it was actually a ransomware incident that caused the service disruptions.

article thumbnail

Why CISOs Are Joining 'The Great Resignation'

SecureWorld News

We hear it all the time: there are not enough people to fill all the cybersecurity roles (including CISOs) that are currently available, not to mention the openings expected in the coming months and years. Yet, CISOs are bailing out of their positions at an alarming rate to go do something, anything else, that is less stressful and a lot less taxing.

CISO 98
article thumbnail

Update now! NetGear routers’ default configuration allows remote attacks

Malwarebytes

NetGear has made a hotfix available for its Nighthawk routers after researchers found a network misconfiguration in the firmware allowed unrestricted communication with the internet facing ports of the device listening through IPv6. No auto-update. The hotfix is available for the model RAX30 , also known as the Nighthawk AX5 5-Stream AX2400 WiFi 6 Router.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!