Sun.Jul 10, 2022

article thumbnail

Experian, You Have Some Explaining to Do

Krebs on Security

Twice in the past month KrebsOnSecurity has heard from readers who’ve had their accounts at big-three credit bureau Experian hacked and updated with a new email address that wasn’t theirs. In both cases the readers used password managers to select strong, unique passwords for their Experian accounts. Research suggests identity thieves were able to hijack the accounts simply by signing up for new accounts at Experian using the victim’s personal information and a different email

article thumbnail

North Korea Attacks Health Sector With Maui Ransomware

Lohrman on Security

On July 6, 2022, CISA issued a new national cyber awareness system alert ( AA22-187A). Here’s what you need to know — and do next.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Defending Aircraft Networks Against Cybersecurity Breaches

The State of Security

The aviation industry is both vast and complex. More than 45,000 flights and 2.9 million passengers travel through U.S. airspace every day, requiring high-tech tools and extensive communications networks. All of that data and complexity makes the sector a prime target for cybercriminals. Worryingly, only 49% of non-governmental organizations have fully adopted NIST security standards. […]… Read More.

article thumbnail

French telephone operator La Poste Mobile suffered a ransomware attack

Security Affairs

French virtual mobile telephone operator La Poste Mobile was hit by a ransomware attack that impacted administrative and management services. . The ransomware attack hit the virtual mobile telephone operator La Poste Mobile on July 4 and paralyzed administrative and management services. . The company pointed out that threat actors may have accessed data of its customers, for this reason it is recommending them to be vigilant.

Mobile 102
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Hackers Used Fake Job Offer to Hack and Steal $540 Million from Axie Infinity

The Hacker News

The $540 million hack of Axie Infinity's Ronin Bridge in late March 2022 was the consequence of one of its former employees getting tricked by a fraudulent job offer on LinkedIn, it has emerged.

Hacking 98
article thumbnail

Experts demonstrate how to unlock several Honda models via Rolling-PWN attack

Security Affairs

Bad news for the owners of several Honda models, the Rolling-PWN Attack vulnerability can allow unlocking their vehicles. A team of security Researchers Kevin2600 and Wesley Li from Star-V Lab independently discovered a flaw in Honda models, named the Rolling-PWN Attack vulnerability (CVE-2021-46145), that can allow unlocking their vehicles-. A remote keyless entry system (RKE) allows remotely unlocking or starting a vehicle.

More Trending

article thumbnail

PyPI Repository Makes 2FA Security Mandatory for Critical Python Projects

The Hacker News

The maintainers of the official third-party software repository for Python have begun imposing a new two-factor authentication (2FA) condition for projects deemed "critical." "We've begun rolling out a 2FA requirement: soon, maintainers of critical projects must have 2FA enabled to publish, update, or modify them," Python Package Index (PyPI) said in a tweet last week.

article thumbnail

How the FBI quietly added itself to criminals’ instant message conversations

Malwarebytes

Motherboard has disclosed some information about Operation Trojan Shield , in which the FBI intercepted messages from thousands of encrypted phones around the world. These messages are now used in courts across the world as corroborating evidence. Operation Trojan Shield. The US Federal Bureau of Investigation (FBI), the Dutch National Police (Politie), and the Swedish Police Authority (Polisen), in cooperation with the US Drug Enforcement Administration (DEA) and 16 other countries, carried out

article thumbnail

Security Affairs newsletter Round 373 by Pierluigi Paganini

Security Affairs

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for free in your email box. Apple Lockdown Mode will protect users against highly targeted cyberattacks Fortinet addressed multiple vulnerabilities in several products Rozena backdoor delivered by exploiting the Follina bug Ongoing Raspberry Robin campaign leverages compromised QNAP devices Evolution of the LockBit Ransomware operation relies on new techniques Cisco fixed a

article thumbnail

North Korean APT targets US healthcare sector with Maui ransomware

Malwarebytes

State-sponsored North Korean threat actors have been targeting the US Healthcare and Public Health (HPH) sector for the past year using the Maui ransomware, according to a joint cybersecurity advisory (CSA) from the FBI, Cybersecurity and Infrastructure Security Agency (CISA), and the Department of the Treasury. CISA Director Jen Easterly also announced the CSA on Twitter.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How Shady Code Commits Compromise the Security of the Open-Source Ecosystem

Trend Micro

In this blog entry, we discuss how open-source code has been subjected to protest-driven code modifications by its maintainers or backers. We also provide an analysis of what these incidents could mean for the IT industry and the open source community.

article thumbnail

Maastricht University wound up earning money from its ransom payment

Bleeping Computer

Maastricht University (UM), a Dutch university with more than 22,000 students, said last week that it has recovered the ransom paid after a ransomware attack that hit its network in December 2019. [.].

article thumbnail

Using DevSecOps for Efficient IT Security

The State of Security

DevSecOps is the key to achieving effective IT security in software development. By taking a proactive approach to security and building it into the process from the start, DevSecOps ensures improved application security. It also allows organizations to rapidly develop application security with fewer bottlenecks and setbacks. Some critical aspects of the DevSecOps approach and […]… Read More.

article thumbnail

New Google Chrome feature reduces CPU use to extend battery life

Bleeping Computer

Google is testing a new 'Quick Intensive Throttling' feature that reduces CPU time by 10%, extending the battery life for laptops and mobile devices. [.].

Mobile 83
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Could TikTok Be Removed From App Stores, HackerOne Employee Caught Stealing Vulnerability Reports, California Gun Owner Data Breach

Security Boulevard

The commissioner of the FCC (Federal Communications Commission), asked the CEOs of Apple and Google to remove TikTok from their app stores, bug bounty platform HackerOne disclosed that a former employee improperly accessed security reports and submitted them for personal gain, and new details on the California gun owner data breach which had exposed the […].

article thumbnail

Private 5G Network Security Expectations Part 3

Trend Micro

How to secure your private 5G networks; The challenge of complex ecosystem in DX.

article thumbnail

Experian, You Have Some Explaining to Do

Security Boulevard

Twice in the past month KrebsOnSecurity has heard from readers who've had their accounts at big-three credit bureau Experian hacked and updated with a new email address that wasn't theirs. In both cases the readers used password managers to select strong, unique passwords for their Experian accounts. Research suggests identity thieves were able to hijack the accounts simply by signing up for new accounts at Experian using the victim's personal information and a different email address.

article thumbnail

Data Distribution Service: Mitigating Risks Part 3

Trend Micro

In the final chapter of our blog series, we discuss mitigating strategies and recommendations to keep DDS protected from malicious actors.

Risk 52
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Your Keys to Better Healthcare Information Security

Security Boulevard

As your use of medical software increases, so does the value of your healthcare data. Protecting patient health information (PHI) is now more critical than ever. You should know that great strides have been made to improve the protection of …. Your Keys to Better Healthcare Information Security Read More ». The post Your Keys to Better Healthcare Information Security appeared first on TechSpective.

article thumbnail

waymore v1.28 releases: find even more links from the Wayback Machine

Penetration Testing

waymore The idea behind waymore is to find even more links from the Wayback Machine than other existing tools. ? The biggest difference between waymore and other tools is that it can also download the archived responses for URLs on... The post waymore v1.28 releases: find even more links from the Wayback Machine appeared first on Penetration Testing.

article thumbnail

Rust CLI For Apple’s WeatherKit REST API

Security Boulevard

Apple is in the final stages of shuttering the DarkSky service/API. They’ve replaced it with WeatherKit, which has both an xOS framework version as well as a REST API. To use either, you need to be a member of the Apple Developer Program (ADP) — $99.00/USD per-year — and calls to the service via either. Continue reading ?. The post Rust CLI For Apple’s WeatherKit REST API appeared first on Security Boulevard.

52
article thumbnail

4 ways businesses can save money on cyber insurance

Malwarebytes

So, your business has just suffered a data breach and it’s time to dig deep in your pockets to pay all the resulting expenses. Without cyber insurance , you can expect to pay a dizzying amount of cash. In 2022 alone, the average cost of a data breach for businesses under 1,000 employees was close to $3 million—and these costs are coming from activities that cyber insurers typically cover, such as detecting and responding to the breach.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Security BSides Athens 2022 – Live Stream Part 2

Security Boulevard

Our sincere thanks to Security BSides Athens for publishing their Presenter’s Security BSides Athens 2022 Conference content on the organization’s’ YouTube channel. Permalink. The post Security BSides Athens 2022 – Live Stream Part 2 appeared first on Security Boulevard.

article thumbnail

Security BSides Athens 2022 – Live Stream Part 1

Security Boulevard

Our sincere thanks to Security BSides Athens for publishing their Presenter’s Security BSides Athens 2022 Conference content on the organization’s’ YouTube channel. Permalink. The post Security BSides Athens 2022 – Live Stream Part 1 appeared first on Security Boulevard.

article thumbnail

XKCD ‘Meta-Alternating Current’

Security Boulevard

via the comic artistry and dry wit of Randall Munroe , resident at XKCD ! Permalink. The post XKCD ‘Meta-Alternating Current’ appeared first on Security Boulevard.

52
article thumbnail

North Korea Attacks Health Sector With Maui Ransomware

Security Boulevard

On July 6, 2022, CISA issued a new national cyber awareness system alert ( AA22-187A). Here’s what you need to know — and do next. The post North Korea Attacks Health Sector With Maui Ransomware appeared first on Security Boulevard.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Using DevSecOps for Efficient IT Security

Security Boulevard

DevSecOps is the key to achieving effective IT security in software development. By taking a proactive approach to security and building it into the process from the start, DevSecOps ensures improved application security. It also allows organizations to rapidly develop application security with fewer bottlenecks and setbacks. Some critical aspects of the DevSecOps approach and […]… Read More.

article thumbnail

Defending Aircraft Networks Against Cybersecurity Breaches

Security Boulevard

The aviation industry is both vast and complex. More than 45,000 flights and 2.9 million passengers travel through U.S. airspace every day, requiring high-tech tools and extensive communications networks. All of that data and complexity makes the sector a prime target for cybercriminals. Worryingly, only 49% of non-governmental organizations have fully adopted NIST security standards. […]… Read More.