Wed.Aug 25, 2021

article thumbnail

Surveillance of the Internet Backbone

Schneier on Security

Vice has an article about how data brokers sell access to the Internet backbone. This is netflow data. It’s useful for cybersecurity forensics, but can also be used for things like tracing VPN activity. At a high level, netflow data creates a picture of traffic flow and volume across a network. It can show which server communicated with another, information that may ordinarily only be available to the server owner or the ISP carrying the traffic.

Internet 355
article thumbnail

Man Robbed of 16 Bitcoin Sues Young Thieves’ Parents

Krebs on Security

In 2018, Andrew Schober was digitally mugged for approximately $1 million worth of bitcoin. After several years of working with investigators, Schober says he’s confident he has located two young men in the United Kingdom responsible for using a clever piece of digital clipboard-stealing malware that let them siphon his crypto holdings. Schober is now suing each of their parents in a civil case that seeks to extract what their children would not return voluntarily.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Want to become a white-hat hacker? Here's what you need to know

Tech Republic Security

Switch to an exciting new tech career as a white-hat hacker. For this training course, you can study on your own time without going into debt.

161
161
article thumbnail

Critical F5 BIG-IP bug impacts customers in sensitive sectors

Bleeping Computer

BIG-IP application services company F5 has fixed more than a dozen high-severity vulnerabilities in its networking device, one of them being elevated to critical severity under specific conditions. [.].

143
143
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How safe is a quantum-safe virtual private network?

Tech Republic Security

Verizon aims to find out by testing the technology, which is geared at enhancing encryption methods using session key exchange security mechanisms, the carrier said.

article thumbnail

Cyber Attack on Crypto Exchange brings $97 million loss to customers

CyberSecurity Insiders

Japan-based Cryptocurrency Exchange Company named ‘Liquid’ was reportedly hit by a cyber attack after which the cyber crooks managed to pull $97 million directly from the e-wallets of several customers. Highly placed sources suspect a well known cyber criminal gang behind the attack and have launched a separate investigation that also includes security veterans from the law enforcement.

More Trending

article thumbnail

Names of new ransomware groups that are on rise

CyberSecurity Insiders

All these days the government agencies and corporate networks were busy in combating known ransomware groups such as REvil, Conti, DarkSide, CLOP and Egregor along with Babuk, DopplePaymer and Ragnar. Now, a report released by the security firm Palo Alto Networks has confirmed that the list needs to have 4 new names added to list and those are AvosLocker, Hive, Hello Kitty and LockBit 2.0.

article thumbnail

Neural Fuzzing: A Faster Way to Test Software Security

eSecurity Planet

Software vulnerabilities are a grave threat to the security of computer systems. They often go undetected for years until it is too late and the consequences are irreversible. In order to find these weaknesses, software security testers and developers often have to manually test the entire codebase and determine if any vulnerabilities exist. However, this can take months or even years of work due to the scale of modern software projects.

Software 133
article thumbnail

Microsoft: ProxyShell bugs “might be exploited,” patch servers now!

Bleeping Computer

Microsoft has finally published guidance today for the actively exploited ProxyShell vulnerabilities impacting multiple on-premises Microsoft Exchange versions. [.].

137
137
article thumbnail

Linux Attackers Take Advantage of Unpatched Vulnerabilities

Security Boulevard

Linux operating systems are being targeted by malicious actors as organizations increase their digital footprint in the cloud, with many attackers of the open source OS likely taking advantage of outdated software with unpatched vulnerabilities, according to the Linux Threat Report 2021 1H from Trend Micro. The Trend Micro report, which investigates the top malware.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Australia passes new data privacy bill for criminals

CyberSecurity Insiders

Australian government has passed a new bill that allows the law enforcement agencies to spy on criminals and if necessary suspend or take over their online accounts on a permanent note. Titled the Surveillance Legislation Amendment (Identity and Disrupt) bill, it will allow the Australian Federal Police (AFP) and Australian Criminal Intelligence Commission to get data disruption warrants to change, copy, add or delete data related to cyber criminals and suspects.

article thumbnail

How Cybercriminals Weaponize Social Media

Digital Shadows

There’s no denying that social media has forever changed how we interact with one another. Social media has been more. The post How Cybercriminals Weaponize Social Media first appeared on Digital Shadows.

Media 127
article thumbnail

The Fastest Way to Help Afghan Women

Jane Frankland

As many of you know, I’m about to launch a brand new project for women in cybersecurity. I’m incredibly excited about it despite the fact that covid is in my house. Sadly, my son was diagnosed with it on Monday, and whilst my daughter and I are sympathetic and are tending to him, we’re counting down the days until he’s better and we can stop self-isolating!

Education 100
article thumbnail

Star Wars Jokes?

Adam Shostack

If you’re seeing this in your feed, have you also seen a bad Star Wars joke? Because I’ve got one on the new blog. Please add [link] , or replace the feed you’re reading with it. (This is the adam.shostack.org version of this post; the new post is just at shostack.org).

100
100
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

FIN8 group used a previously undetected Sardonic backdoor in a recent attack

Security Affairs

Financially motivated threat actor FIN8 employed a previously undocumented backdoor, tracked as ‘Sardonic,’ in recent attacks. The financially motivated threat actor FIN8 has been observed employing a previously undetected backdoor, dubbed Sardonic , on infected systems. The new backdoor was spotted by researchers from cybersecurity firm Bitdefender, it was discovered while investigating an unsuccessful attack carried out by FIN8 aimed at an unnamed financial institution in the U.S.

Retail 121
article thumbnail

Ethereum urges Go devs to fix severe chain-split vulnerability

Bleeping Computer

Ethreum project is urging developers to apply a hotfix to squash a high-severity vulnerability. The chain-split vulnerability tracked as CVE-2021-39137, impacts "Geth," the official Golang implementation of the Ethereum protocol. [.].

116
116
article thumbnail

Getting Started with PIPL Compliance

TrustArc

The Chinese Personal Information Protection Law (PIPL) will apply as of 1 November 2021, only 73 days after it was adopted by the National People’s Congress. It is a short deadline for companies doing business in China to work towards compliance. A further complication is that the PIPL is relying heavily upon further guidance and […].

116
116
article thumbnail

How Windows admins can get started with computer forensics

CSO Magazine

The recent cybersecurity symposium that aimed to “prove” the 2020 US election was a fraud made headlines not because of evidence found, but rather the absence of evidence. As I watched the three-day event, it reminded me how unknown most of the technology behind computers is. A bit of disclosure: While I’ve analyzed computer systems and even testified in court about them, I would not consider myself an expert in all forensic circumstances.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Zero Trust Can’t Protect Everything. Here’s What You Need to Watch.

eSecurity Planet

Zero trust architecture is an emerging technology in cybersecurity that offers an alternative to the traditional castle-and-moat approach to security. Instead of focusing only on your perimeter to defend against attacks from the outside, zero trust assumes that threats are ubiquitous and pervasive. Therefore, each user, device, and application within your network must verify that it isn’t a threat before it can proceed.

article thumbnail

The best browsers for privacy and security

Malwarebytes

Unfortunately there is a low correlation factor between what most people find the best browsers and what are the best browsers when it comes to privacy and security. If you look at the market share of the most popular browsers , there is one browser that steals the crown without a lot of competition: Google’s Chrome. Safari is the only other one that passes the 10% line, the rest merely look like marginal players.

VPN 112
article thumbnail

FIN8 cybercrime gang backdoors US orgs with new Sardonic malware

Bleeping Computer

A financially motivated cybercrime gang has breached and backdoored the network of a US financial organization with a new malware known dubbed Sardonic by Bitdefender researchers who first spotted it. [.].

article thumbnail

Hackers Impersonate OpenSea Employees in an Attempt to Steal Cryptocurrency Assets and NFTs

Heimadal Security

Recently, it has been found that an aggressive phishing attack in progress on the crypto gods platform OpeaSea is targeting its clients in order to steal non-fungible tokens (NFT) and cryptocurrency. Apparently, cybercriminals have been hiding in the platform’s Discord server posing as authentic OpenSea employees who offer assistance for the website.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

OnePercent Ransomware Group Has Hit US Companies Since November

Digital Guardian

The group, like other malicious campaigns of late, has been using Cobalt Strike to carry out ransomware attacks against companies.

article thumbnail

New Hampshire town loses $2.3 million to overseas scammers

Bleeping Computer

Peterborough, a small New Hampshire town, has lost $2.3 million after BEC scammers redirected several bank transfers using forged documents sent to the town's Finance Department staff in multiple email exchanges. [.].

Banking 110
article thumbnail

Build and improve your company’s culture of security with 1Password

Graham Cluley

Graham Cluley Security News is sponsored this week by the folks at 1Password. Thanks to the great team there for their support! The shift to remote and hybrid work has introduced new vulnerabilities, putting your critical data at risk. With less oversight into security protocols and the behavior of your staff, it’s more important than … Continue reading "Build and improve your company’s culture of security with 1Password".

Risk 109
article thumbnail

Biometrics: Does GDPR mean thumbs down for fingerprint scanners in the workplace?

BH Consulting

As physical offices reopen, providing secure access to workplaces will now be back on the agenda for many organisations. Some may feel swipe cards and lanyards are a little old school. Maybe they’re thinking about upgrading to biometric technology like fingerprint scanners as a way to improve security and convenience. But managers and business owners might not realise that biometrics bring data protection concerns.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

F5 addressed a flaw in BIG-IP devices rated as critical severity under specific conditions

Security Affairs

F5 has addressed more than a dozen severe vulnerabilities in its BIG-IP networking device, including one rated as critical severity under specific conditions. Security vendor F5 has addressed more than a dozen high-severity vulnerabilities in its BIG-IP networking device, including an issue that was considered as critical severity when exploited under specific conditions.

article thumbnail

Win10 Admin Rights Tossed Off by Yet Another Plug-In

Threatpost

Then again, you don’t even need the actual device – in this case, a SteelSeries peripheral – since emulation works just fine to launch with full SYSTEM rights.

Hacking 110
article thumbnail

Popular WhatsApp Mod Spreads Malware on Android Devices

Heimadal Security

Cybersecurity firm Kaspersky discovered a malicious variant of the FMWhatsApp mod that spreads malware to users’ devices. What Is a WhatsApp Mod? A WhatsApp mod is an altered version of the WhatsApp app, or better said, a user-created version of the application that is not officially authorized by the company. This version, created by third-party […].

Malware 104
article thumbnail

ShinyHunters group claims to have data of 70M AT&T customers

Security Affairs

Threat actors claim to have a database containing private information on roughly 70 million AT&T customers, but the company denies any security breach. ShinyHunters group claims to have a database containing private information on roughly 70 million AT&T customers, but the company denies that they have been stolen from its systems. ShinyHunters is a popular hacking crew that is known to have offered for sale data stolen from tens of major organizations, including Tokopedia , Homechef , C

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.