Sun.Sep 04, 2022

article thumbnail

NATO Countries Hit With Unprecedented Cyber Attacks

Lohrman on Security

Montenegro, Estonia and new NATO applicant Finland are just three of the countries being hit hard by sophisticated cyber attacks. What’s happening and who’s next?

article thumbnail

Weekly Update 311

Troy Hunt

Well, after a crazy amount of work, a lot of edits, reflection, and feedback cycles, "Pwned" is almost here: This better be a sizzling read @troyhunt or I'll be crashing the wedding in ways never done before. Also, I thought they'd cancelled Neighbours? 😉❤️ pic.twitter.com/jrYIKtL0Uh — Mike Thompson (@AppSecBloke) August 30, 2022 The preview cycle is in full swing with lots of feedback coming in and revisions being made before we push it live to the

213
213
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Defender falsely detects Win32/Hive.ZY in Google Chrome, Electron apps

Bleeping Computer

A bad Microsoft Defender signature update mistakenly detects Google Chrome, Microsoft Edge, Discord, and other Electron apps as 'Win32/Hive.ZY' each time the apps are opened in Windows. [.].

100
100
article thumbnail

Anonymous hacked Yandex taxi causing a massive traffic jam in Moscow

Security Affairs

The popular collective Anonymous and the IT Army of Ukraine hacked the Yandex Taxi app causing a massive traffic jam in Moscow. This week Anonymous announced to have hacked the Yandex Taxi app, the largest taxi service in Russia, and used it to cause a massive traffic jam in Moscow. The threat actors ordered all available taxis to a particular address.

Hacking 99
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

SharkBot malware sneaks back on Google Play to steal your logins

Bleeping Computer

A new and upgraded version of the SharkBot malware has returned to Google's Play Store, targeting banking logins of Android users through apps that have tens of thousands of installations. [.].

Malware 98
article thumbnail

NATO Countries Hit With Unprecedented Cyber Attacks

Security Boulevard

Montenegro, Estonia and new NATO applicant Finland are just three of the countries being hit hard by sophisticated cyber attacks. What’s happening and who’s next? The post NATO Countries Hit With Unprecedented Cyber Attacks appeared first on Security Boulevard.

More Trending

article thumbnail

Peter Eckersley, co-creator of Let’s Encrypt, dies at just 43

Naked Security

This site, like millions of others, has a certificate from Let's Encrypt. Farewell, Peter Eckersley, PhD, who helped make it all possible.

article thumbnail

BSides Vancouver 2022 – Anthony Green’s And Penny Longman’s ‘How To Create A Cyber Security Culture’

Security Boulevard

Our sincere thanks to BSides Vancouver for publishing their outstanding conference videos on the organization's YouTube channel. Permalink. The post BSides Vancouver 2022 – Anthony Green’s And Penny Longman’s ‘How To Create A Cyber Security Culture’ appeared first on Security Boulevard.

article thumbnail

Violence-as-a-Service: Brickings, Firebombings & Shootings for Hire

Krebs on Security

A 21-year-old New Jersey man has been arrested and charged with stalking in connection with a federal investigation into groups of cybercriminals who are settling scores by hiring people to carry out physical attacks on their rivals. Prosecutors say the defendant recently participated in several of these schemes — including firing a handgun into a Pennsylvania home and torching a residence in another part of the state with a Molotov Cocktail.

article thumbnail

Violence-as-a-Service: Brickings, Firebombings & Shootings for Hire

Security Boulevard

A 21-year-old New Jersey man has been arrested and charged with stalking in connection with a federal investigation into groups of cybercriminals who are settling scores by hiring people to carry out physical attacks on their rivals. Prosecutors say the defendant recently participated in several of these schemes -- including firing a handgun into a Pennsylvania home and torching a residence in another part of the state with a Molotov Cocktail.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Death of the VPN: A Security Eulogy

SecureWorld News

Trust can be a hard thing to come by in this world but in the world of cybersecurity, trust is virtually non-existent, or at least it should be. VPNs got us all from crawling to walking in the early days of the internet, but security needs have outpaced VPNs' abilities to deliver true security and privacy for users and organizations so we now look to more advanced solutions to keep us cybersafe.

VPN 131
article thumbnail

IRS mistakenly published confidential info for roughly 120K taxpayers

Security Affairs

The Internal Revenue Service (IRS) mistakenly leaked confidential information for approximately 120,000 taxpayers. Bad news for approximately 120,000 taxpayers who filed a form 990-T as part of their tax returns, the Internal Revenue Service has accidentally leaked their confidential information. Form 990-T is a form that a tax exempt organization files with the IRS to report its unrelated business income and to figure the tax owed on that income.

Hacking 97