Thu.Jul 29, 2021

The Life Cycle of a Breached Database

Krebs on Security

Every time there is another data breach, we are asked to change our password at the breached entity. But the reality is that in most cases by the time the victim organization discloses an incident publicly the information has already been harvested many times over by profit-seeking cybercriminals.

AirDropped Gun Photo Causes Terrorist Scare

Schneier on Security

A teenager on an airplane sent a photo of a replica gun via AirDrop to everyone who had their settings configured to receive unsolicited photos from strangers. This caused a three-hour delay as the plane — still at the gate — was evacuated and searched.

234
234
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Black Hat insights: How Sonrai Security uses graph analytics to visualize, mitigate cloud exposures

The Last Watchdog

Modern civilization revolves around inextricably intertwined relationships. This is why our financial markets rise and fall in lock step; why climate change is accelerating; and why a novel virus can so swiftly and pervasively encircle the planet. Related: What it will take to truly secure data lakes. Complex relationships also come into play when it comes to operating modern business networks. A lack of understanding of these relationships is a big reason why cloud breaches happen.

LockBit 2.0, the first ransomware that uses group policies to encrypt Windows domains

Security Affairs

A new variant of the LockBit 2.0 ransomware is now able to encrypt Windows domains by using Active Directory group policies. Researchers from MalwareHunterTeam and BleepingComputer, along with the malware expert Vitali Kremez reported spotted a new version of the LockBit 2.0

How to Avoid the Pain and Cost of PCI Compliance While Optimizing Payments

Speaker: P. Andrew Sjogren, Sr. Product Marketing Manager at Very Good Security, Matt Doka, Co-Founder and CTO of Fivestars, and Steve Andrews, President & CEO of the Western Bankers Association 

In this webinar, we have a great set of panelists who will take you through how Zero Data strategies can be used as part of a well-rounded compliance and security approach, and get you to market much sooner by also allowing for payment optimization. They’ll share how to grow your business faster and minimize costs for both security and compliance

Death Kitty Ransomware and BlackMatter Ransomware details

CyberSecurity Insiders

Death Kitty Ransomware that targeted South African Port Transnet has disrupted the networks, forcing the company to declare Force Majeure at Container Terminals and Cargo shifting, forcing the staff to switch to manual paper and pen work.

How to attend Black Hat USA 2021 and DEF CON 29 virtually

Tech Republic Security

DEF CON 29 sold out of virtual passes, so tuning in on Twitch and Discord are the best options for attending online this year

162
162

More Trending

Best Practices to Thwart Business Email Compromise (BEC) Attacks

The Hacker News

Business email compromise (BEC) refers to all types of email attacks that do not have payloads. Although there are numerous types, there are essentially two main mechanisms through which attackers penetrate organizations utilizing BEC techniques, spoofing and account take-over attacks.

DarkTrace Cyber Protects Fashion retailer Ted Baker

CyberSecurity Insiders

Cyber Security firm DarkTrace that uses the technology of Artificial Intelligence to track down cyber threats is nowadays busy protecting the computer network of British Fashion retailer Ted Baker.

Retail 113

BlackMatter and Haron, two new ransomware gangs in the threat landscape

Security Affairs

The cyber threat landscape change continuously, recently two new ransomware-as-service (RaaS) operations named BlackMatter and Haron made the headlines. Recently, two new ransomware gangs, named BlackMatter and Haron, announced the beginning of the operations.

Why RaaS Has Become Easier to Launch

Security Boulevard

Straight from the researchers at Intel 471 comes this pro tip for cybersecurity teams inside organizations: Being proactive about what the cybercriminal underground is learning and how it’s behaving can help you pinpoint solutions for your security needs.

Back to the Office: Privacy and Security Solutions to Compliance Issues for 2021 and Beyond

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

Now that companies are slowly allowing employees to return to work at the office, it's time to re-evaluate your company’s posture towards privacy and security. Join Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies, for a discussion that will focus on compliance and the types of privacy and security measures your company should be aware of, as well as tips and methods for implementing these measures.

BrandPost: Defend Against Ransomware With Relationship-Driven Incident Response

CSO Magazine

Cyberattacks are so sophisticated these days that even with the best education and training, employees inadvertently click links or download documents that look all too real.

New Android Malware Uses VNC to Spy and Steal Passwords from Victims

The Hacker News

A previously undocumented Android-based remote access trojan (RAT) has been found to use screen recording features to steal sensitive information on the device, including banking credentials, and open the door for on-device fraud.

Meteor was the wiper used against Iran’s national railway system

Security Affairs

The recent attack against Iran’s national railway system was caused by a wiper malware dubbed Meteor and not by a ransomware as initially thought.

Hackers Exploit Microsoft Browser Bug to Deploy VBA Malware on Targeted PCs

The Hacker News

An unidentified threat actor has been exploiting a now-patched zero-day flaw in Internet Explorer browser to deliver a fully-featured VBA-based remote access trojan (RAT) capable of accessing files stored in compromised Windows systems, and downloading and executing malicious payloads as part of an "unusual" campaign.

Estonia ‘s police arrested a Tallin resident who stole 286K ID scans from a government DB

Security Affairs

Estonia ‘s police arrested a man from Tallinn that is suspected to be the hacker who stole 286K ID scans from the government systems. Estonian police arrested a man from Tallinn that is suspected to have stolen 286,438 belonging to Estonians citizens from the government systems.

How Digital ID can help citizens access government services from anywhere

CyberSecurity Insiders

Over the last 18 months, the digitalisation of public and private services has accelerated like never before.

Critical flaw in Microsoft Hyper-V could allow RCE and DoS

Security Affairs

Experts disclose details about a critical flaw in Microsoft Hyper-V, tracked as CVE-2021-28476, that can allow executing arbitrary code on it.

BrandPost: Securing the Digital Infrastructure with Integrated Security Services

CSO Magazine

Many organizations are challenged with the evolving threat landscape, which continues to become much more sophisticated and harder to manage with isolated point products and disparate services.

Phantom Warships Are Courting Chaos in Conflict Zones

WIRED Threat Level

The latest weapons in the global information war are fake vessels behaving badly. Security Security / National Security

96

BrandPost: Securing Hybrid Data Centers and Preventing Ransomware

CSO Magazine

As more organizations reopen their offices to employees, many are still offering remote work as an option, with a new ‘work from anywhere’ model becoming the reality for the foreseeable future.

Risk 97

What are Common Types of Social Engineering Attacks?

eSecurity Planet

Social engineering is a common technique that cybercriminals use to lure their victims into a false sense of security.

10 security tools all remote employees should have

CSO Magazine

It’s no secret that humans are the biggest vulnerability to any corporate network. Whether it’s an inability to properly manage password complexity across multiple systems, poor social media habits, or even a lack of awareness with things like email links, online shopping, or app and software usage.

Media 95

How to remove or update a single entry from the SSH known_hosts file

Tech Republic Security

SSH holds fingerprints of your remote machines in the known_hosts file. Sometimes you might need to remove or update one of those entries. Jack Wallen shows you how

135
135

Pushing the Limits of IDaaS with AMaaS

Security Boulevard

Concern over secure access to data has led to significant adoption of cloud identity management solutions, specifically identity-as-a-service (IDaaS), to ensure that people accessing applications are who they say they are–that is, to authenticate their identity.

The evolution of spear phishing and who criminals are targeting

Tech Republic Security

A report from Barracuda Networks also identifies attack risks associated with various roles throughout a company ranging from CEOs and IT departments to employees in sales

Elevating Web App Security to a National Priority

Security Boulevard

It’s been an eventful few months in terms of sizable cyberattacks. First, we had the SolarWinds hack, then the Colonial Pipeline ransomware attack made cybersecurity acutely real for millions of people in the U.S.

How to ensure your vendors are cybersecure to protect you from supply chain attacks

Tech Republic Security

Right now supply-chain vendors are a prime target for cybercriminals. One expert offers ways to remove the bullseye from supply vendors

Top 30 Critical Security Vulnerabilities Most Exploited by Hackers

The Hacker News

Intelligence agencies in Australia, the U.K., and the U.S. issued a joint advisory on Wednesday detailing the most exploited vulnerabilities in 2020 and 2021, once again demonstrating how threat actors are able to weaponize publicly disclosed flaws to their advantage swiftly.

Tackling the insider threat to the new hybrid workplace

We Live Security

Now that organizations are set to evolve a hybrid blend of home and office-based work for most employees, it is more important then ever to address the risks that insider threat can - willingly or unwitingly - pose.

Risk 89

New Ransomware Gangs — Haron and BlackMatter — Emerge on Cybercrime Forums

The Hacker News

Two new ransomware-as-service (RaaS) programs have appeared on the threat radar this month, with one group professing to be a successor to DarkSide and REvil, the two infamous ransomware syndicates that went off the grid following major attacks on Colonial Pipeline and Kaseya over the past few months.

Surefire Tips – How To Protect Your Data From Cyber Attacks

SecureBlitz

Here, we reveal how to protect your data from cyber attacks. The Internet can be a scary place. With hackers looking for a small chance to enter the network and steal your data, the information stored in your computer is never safe until you take the necessary precautions.

"Real Estate for a Purpose": Cisco unveils hybrid work plans and tech to support distributed teams

Tech Republic Security

After a year of WFH, companies are offering a mixed bag of flexible work arrangements. In the hybrid work era, the traditional office is getting a makeover to assist workers on-site and elsewhere

124
124

Leading cybersecurity agencies reveal list of most exploited vulnerabilities of the past 2 years

We Live Security

There are 30 vulnerabilities listed in total; organizations would do well to patch their systems if they haven’t done so yet. The post Leading cybersecurity agencies reveal list of most exploited vulnerabilities of the past 2 years appeared first on WeLiveSecurity. Vulnerability

Phishing Attacks Often Target Small Businesses – Here’s What to Watch for

Security Boulevard

Scammers target businesses with phishing emails all the time, pretending to be legitimate customers or vendors asking for payment.

NSA shares guidance on how to secure your wireless devices

Bleeping Computer

The US National Security Agency (NSA) today published guidance on how to properly secure wireless devices against potential attacks targeting them when traveling or working remotely. [.]. Security