Fri.Sep 01, 2023

article thumbnail

Spyware Vendor Hacked

Schneier on Security

A Brazilian spyware app vendor was hacked by activists: In an undated note seen by TechCrunch, the unnamed hackers described how they found and exploited several security vulnerabilities that allowed them to compromise WebDetetive’s servers and access its user databases. By exploiting other flaws in the spyware maker’s web dashboard—used by abusers to access the stolen phone data of their victims—the hackers said they enumerated and downloaded every dashboard record, including every

Spyware 267
article thumbnail

Why is.US Being Used to Phish So Many of Us?

Krebs on Security

Domain names ending in “ US ” — the top-level domain for the United States — are among the most prevalent in phishing scams, new research shows. This is noteworthy because.US is overseen by the U.S. government, which is frequently the target of phishing domains ending in.US. Also,US domains are only supposed to be available to U.S. citizens and to those who can demonstrate that they have a physical presence in the United States.US is the “country code top-level doma

Phishing 225
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK’s NCSC Warns Against Cybersecurity Attacks on AI

Tech Republic Security

The National Cyber Security Centre provides details on prompt injection and data poisoning attacks so organizations using machine-learning models can mitigate the risks.

article thumbnail

Microsoft is killing WordPad in Windows after 28 years

Bleeping Computer

Microsoft announced today that it will deprecate WordPad with a future Windows update as it's no longer under active development, though the company did not specify the precise timing of this change. [.

145
145
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

A firsthand perspective on the recent LinkedIn account takeover campaign

Malwarebytes

Not long ago I wrote about a recent campaign to hold LinkedIn users' accounts to ransom. Shortly after I published the article, a co-worker, Peace, reached out to me told me they'd been a target of the campaign. His story begins with an SMS text from LinkedIn telling him to reset his password. He found this confusing: It arrived in the middle of the night, and he hadn't asked for a password reset.

article thumbnail

Exploit released for critical VMware SSH auth bypass vulnerability

Bleeping Computer

Proof-of-concept exploit code has been released for a critical SSH authentication bypass vulnerability in VMware's Aria Operations for Networks analysis tool (formerly known as vRealize Network Insight). [.

More Trending

article thumbnail

North Korea-linked APT Labyrinth Chollima behind PyPI supply chain attacks

Security Affairs

ReversingLabs researchers linked the VMConnect campaign to the North Korea-linked APT group Labyrinth Chollima. ReversingLabs researchers believe that the North Korea-linked APT group Labyrinth Chollima is behind the VMConnect campaign. Threat actors uploaded a series of malicious packages to the PyPI (Python Package Index) repository, including a rogue package posing as the VMware vSphere connector module vConnector named VMConnect targeting IT professionals.

Malware 118
article thumbnail

Fighting Back Against Synthetic Identity Fraud

Security Boulevard

In today’s digital-first world, synthetic identity fraud is becoming more prevalent and pervasive. The post Fighting Back Against Synthetic Identity Fraud appeared first on Security Boulevard.

Risk 117
article thumbnail

Researchers released a free decryptor for the Key Group ransomware

Security Affairs

Researchers released a free decryptor for the Key Group ransomware that allows victims to recover their data without paying a ransom. Threat intelligence firm EclecticIQ released a free decryption tool for the Key Group ransomware (aka keygroup777) that allows victims to recover their data without paying a ransom. The Key Group ransomware gang has been active since at least January 2023.

article thumbnail

Golf gear giant Callaway data breach exposes info of 1.1 million

Bleeping Computer

Topgolf Callaway (Callaway) suffered a data breach at the start of August, which exposed the sensitive personal and account data of more than a million customers. [.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

NYC Subway Disables Trip-History Feature Over Tap-and-Go Privacy Concerns

Dark Reading

The move by New York's Metropolitan Transit Authority (MTA) follows a report that showed how easy it is for someone to pull up another individual's seven-day ride history through the One Metro New York (OMNY) website.

113
113
article thumbnail

Microsoft retires Visual Studio for Mac, support ends in a year

Bleeping Computer

Microsoft has announced it is retiring Visual Studio for Mac and that support for the latest version, 17.6, will continue for another year, until August 31, 2024. [.

Software 119
article thumbnail

FFIEC API Security Guidance for Financial Services

Security Boulevard

In an era where technology is the cornerstone of the financial industry, safeguarding sensitive information and maintaining the integrity of data has become paramount. Financial institutions are constantly faced with the challenge of ensuring the security of their systems, especially when it comes to Application Programming Interfaces (APIs) and API security.

article thumbnail

Talos wars of customizations of the open-source info stealer SapphireStealer

Security Affairs

Cisco reported that multiple threat actors are customizing the SapphireStealer information stealer after the leak of its source code. Cisco Talos researchers reported that multiple threat actors have created their own version of the SapphireStealer after that the source code of the stealer was released on GitHub. SapphireStealer is an open-source information stealer written in.NET, which is available in multiple public malware repositories since its public release in December 2022.

Malware 111
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Classiscam Scam-as-a-Service Raked $64.5 Million During the COVID-19 Pandemic

The Hacker News

The Classiscam scam-as-a-service program has reaped the criminal actors $64.5 million in illicit earnings since its emergence in 2019. "Classiscam campaigns initially started out on classified sites, on which scammers placed fake advertisements and used social engineering techniques to convince users to pay for goods by transferring money to bank cards," Group-IB said in a new report.

Scams 110
article thumbnail

Upskilling the nation’s cybersecurity savvy won’t solve the skills gap | NCWES initiative issues | Contrast Security

Security Boulevard

The White House recently announced its new National Cyber Workforce and Education Strategy & Implementation (NCWES): a mouthful that translates into something along the lines of “Let’s fix this cybersecurity skills gap STAT!” The post Upskilling the nation’s cybersecurity savvy won’t solve the skills gap | NCWES initiative issues | Contrast Security appeared first on Security Boulevard.

article thumbnail

Threat Actors Targeting Microsoft SQL Servers to Deploy FreeWorld Ransomware

The Hacker News

Threat actors are exploiting poorly secured Microsoft SQL (MS SQL) servers to deliver Cobalt Strike and a ransomware strain called FreeWorld. Cybersecurity firm Securonix, which has dubbed the campaign DB#JAMMER, said it stands out for the way the toolset and infrastructure is employed.

article thumbnail

Malicious Generative AI Tools. Buzz, Threat, and Solution

Heimadal Security

After almost a year of generative AI euphoria and praising the Open.Ai ChatGPT model, it`s time to take a step back. Let`s assess how this amazing piece of technology changed the cyber threat landscape. Like any innovation, generative AI tools can also be used to improve human life or harm. So, after a pretty short […] The post Malicious Generative AI Tools.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Russian State-Backed 'Infamous Chisel' Android Malware Targets Ukrainian Military

The Hacker News

Cybersecurity and intelligence agencies from Australia, Canada, New Zealand, the U.K., and the U.S. on Thursday disclosed details of a mobile malware strain targeting Android devices used by the Ukrainian military.

Malware 103
article thumbnail

Microsoft reminds of Windows 11 21H2 forced updates before end of service

Bleeping Computer

Microsoft has reminded customers that systems running Windows 11 21H2 will be force-updated before reaching the end of servicing next month. [.

113
113
article thumbnail

It's a Zero-day? It's Malware? No! It's Username and Password

The Hacker News

As cyber threats continue to evolve, adversaries are deploying a range of tools to breach security defenses and compromise sensitive data. Surprisingly, one of the most potent weapons in their arsenal is not malicious code but simply stolen or weak usernames and passwords.

article thumbnail

The Return of Hacktivism: A Temporary Reprise or Here for Good?

Digital Shadows

The revival of hacktivism has largely been facilitated by one event: Vladimir Putin’s “special military operation,” or Russia’s invasion of Ukraine.

104
104
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Okta Warns of Social Engineering Attacks Targeting Super Administrator Privileges

The Hacker News

Identity services provider Okta on Friday warned of social engineering attacks orchestrated by threat actors to obtain elevated administrator permissions.

article thumbnail

Sourcegraph’s Website Breached by Threat Actors

Heimadal Security

Popular AI-powered coding platform Sourcegraph reveals that its website was breached this week due to a leaked site-admin access token. The token leaked online on July 14th, but it took until the 28th of August for an attacker to use the token to create a new site-admin account and log into the admin dashboard of […] The post Sourcegraph’s Website Breached by Threat Actors appeared first on Heimdal Security Blog.

article thumbnail

Proposed SEC Cybersecurity Rule Will Put Unnecessary Strain on CISOs

Dark Reading

The Security and Exchange Commission's Proposed Rule for Public Companies (PPRC) is ambiguous.

CISO 122
article thumbnail

SapphireStealer: A New Open-Source Information Stealer Malware to Look Out For

Heimadal Security

A new malware is gaining traction in the cyber world. Dubbed SapphireStealer, this open-source.NET-based information-stealing malware has been observed to be used by threat groups, with some of them even creating their own customized variations. As reported by TheHackerNews, the malware can be used to obtain sensitive information, including corporate credentials, which are often […] The post SapphireStealer: A New Open-Source Information Stealer Malware to Look Out For appeared first on He

Malware 86
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

US Government Denies Blocking Sales of AI Chips to Middle East

Dark Reading

Nvidia and AMD do face expanded export rules for their A100 and H100 artificial intelligence (AI) chips in the Middle East, but it's not yet clear why.

article thumbnail

Identifying Shadow AI within an Organization

SecureWorld News

In the age of rapid technological advancements, artificial intelligence (AI) stands tall as one of the most influential technologies of our time. But with great power comes great responsibility. Organizations are constantly grappling with how to effectively manage and oversee their AI deployments. However, an even bigger challenge that many face is the lurking threat of "Shadow AI.

article thumbnail

Key Group Ransomware Foiled by New Decryptor

Dark Reading

Researchers crack Key Group's ransomware encryption and release free tool for victim organizations to recover their data.

article thumbnail

What Is Cloud Workload Protection? Ultimate Guide

eSecurity Planet

Cloud workload protection (CWP) is the process of monitoring and securing cloud workloads from threats, vulnerabilities, and unwanted access, and is typically accomplished via Cloud Workload Protection Platforms (CWPP). Cloud workloads are everything needed to run an application in the cloud, such as databases, containerized environments, and the application itself.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.