Wed.Nov 16, 2022

article thumbnail

Russian Software Company Pretending to Be American

Schneier on Security

Computer code developed by a company called Pushwoosh is in about 8,000 Apple and Google smartphone apps. The company pretends to be American when it is actually Russian. According to company documents publicly filed in Russia and reviewed by Reuters, Pushwoosh is headquartered in the Siberian town of Novosibirsk, where it is registered as a software company that also carries out data processing.

Software 342
article thumbnail

Disneyland Malware Team: It’s a Puny World After All

Krebs on Security

A financial cybercrime group calling itself the Disneyland Team has been making liberal use of visually confusing phishing domains that spoof popular bank brands using Punycode , an Internet standard that allows web browsers to render domain names with non-Latin alphabets like Cyrillic. The Disneyland Team’s Web interface, which allows them to interact with malware victims in real time to phish their login credentials using phony bank websites.

Malware 336
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Get elite identity theft protection from a top-rated provider

Tech Republic Security

Prevent cybercriminals from stealing your identity by acting on this great deal for IDX, which will monitor the Dark Web, your social media accounts and more for suspicious activity and help you recover your identity, if needed. The post Get elite identity theft protection from a top-rated provider appeared first on TechRepublic.

article thumbnail

F5 fixed 2 high-severity Remote Code Execution bugs in its products

Security Affairs

Researchers at cybersecurity firm Rapid7 have identified several vulnerabilities and other potential security issues affecting F5 products. Rapid7 researchers discovered several vulnerabilities in F5 BIG-IP and BIG-IQ devices running a customized distribution of CentOS. The experts also discovered several bypasses of security controls that the security vendor F5 does not recognize as exploitable vulnerabilities.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Stop using Twitter to log in to other websites

Zero Day

With Twitter's growing technical problems, you can't rely on it as your single sign-on for other sites.

140
140
article thumbnail

Lazarus APT uses DTrack backdoor in attacks against LATAM and European orgs

Security Affairs

North Korea-linked Lazarus APT is using a new version of the DTrack backdoor in attacks aimed at organizations in Europe and Latin America. North Korea-linked APT Lazarus is using a new version of the DTrack backdoor to attack organizations in Europe and Latin America, Kaspersky researchers warn. DTrack is a modular backdoor used by the Lazarus group since 2019 , it was employed in attacks against a wide variety of targets, from financial environments to a nuclear power plan.

LifeWorks

More Trending

article thumbnail

Privacy Hits a Low at TikTok, Twitter

Security Boulevard

Privacy on social media has taken a hit this month, which should surprise no one. Just days after Elon Musk took over Twitter, the platform’s chief privacy officer resigned, as did others germane to the company’s safety and security. That was on the heels of reports that TikTok’s privacy policy shows that Chinese staff can. The post Privacy Hits a Low at TikTok, Twitter appeared first on Security Boulevard.

Media 138
article thumbnail

Global Cyber Risk at Elevated Level

Trend Micro

North America Least Prepared for Cyberattacks.

article thumbnail

Iran-linked threat actors compromise US Federal Network

Security Affairs

Iran-linked threat actors compromised a Federal Civilian Executive Branch organization using a Log4Shell exploit and installed a cryptomining malware. According to a joint advisory published by the FBI and CISA, an Iran-linked APT group compromised a Federal Civilian Executive Branch (FCEB) organization using an exploit for the Log4Shell flaw ( CVE-2021-44228 ) and deployed a cryptomining malware.

article thumbnail

Cyber threat as security staff reduction increases during holidays

CyberSecurity Insiders

As holidays season is fast approaching, most of the companies are interested in cutting down their operational costs by cutting security staff by 70% on weekend and holidays. But such a trend could lead to a serious scenario, where hackers can infiltrate the database, but the activity remains anonymous till the staff count returns to normalcy after the second week of January 2023.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Just Published: PCI Mobile Payments on COTS

PCI perspectives

The PCI Security Standards Council (PCI SSC) has published a new standard designed to support the evolution of mobile payment acceptance solutions. PCI Mobile Payments on COTS (MPoC) builds on the existing PCI Software-based PIN Entry on COTS (SPoC) and PCI Contactless Payments on COTS (CPoC) Standards which individually address security requirements for solutions that enable merchants to accept cardholder PINs or contactless payments, using a smartphone or other commercial off-the-shelf (COTS)

Mobile 132
article thumbnail

Higher Education Organization Improves Cybersecurity Posture with NodeZero

Security Boulevard

When the director of technology for a higher education organization went looking for a better way to identify and prioritize security weaknesses on the school’s servers and networks, his first interaction with Horizon3.ai and NodeZero started off with an impressive bang. “I wanted to see proof of concept, and Horizon3.ai solved one of our biggest security holes because of that PoC,”.

Education 131
article thumbnail

DuckDuckGo now lets all Android users block trackers in their apps

Bleeping Computer

DuckDuckGo for Android's 'App Tracking Protection' feature has reached open beta, allowing all Android users to block third-party trackers across all their installed apps. [.].

Mobile 131
article thumbnail

New RapperBot Campaign targets game servers with DDoS attacks

Security Affairs

Fortinet researchers discovered new samples of RapperBot used to build a botnet to launch Distributed DDoS attacks against game servers. Fortinet FortiGuard Labs researchers have discovered new samples of the RapperBot malware that are being used to build a DDoS botnet to target game servers. Researchers from FortiGuard Labs discovered the previously undetected RapperBot IoT botnet in August, and reported that it is active since mid-June 2022.

DDOS 131
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

High Severity Vulnerabilities Reported in F5 BIG-IP and BIG-IQ Devices

The Hacker News

Multiple security vulnerabilities have been disclosed in F5 BIG-IP and BIG-IQ devices that, if successfully exploited, to completely compromise affected systems. Cybersecurity firm Rapid7 said the flaws could be abused to remote access to the devices and defeat security constraints.

article thumbnail

US govt: Iranian hackers breached federal agency using Log4Shell exploit

Bleeping Computer

The FBI and CISA revealed in a joint advisory published today that an unnamed Iranian-backed threat group hacked a Federal Civilian Executive Branch (FCEB) organization to deploy XMRig cryptomining malware. [.].

Malware 129
article thumbnail

Beginning 2023 Google plans to rollout the initial Privacy Sandbox Beta

Security Affairs

Google announced it will roll out the Privacy Sandbox system for Android in beta to a limited number of Android 13 devices in early 2023. Google announced it will roll out the Privacy Sandbox for Android in beta to mobile devices running Android 13 starting early next year. The Privacy Sandbox aims at creating technologies to protect people’s privacy online limiting covert tracking.

Mobile 125
article thumbnail

Suspected Zeus cybercrime ring leader ‘Tank’ arrested by Swiss police

Bleeping Computer

Vyacheslav Igorevich Penchukov, also known as Tank and one of the leaders of the notorious JabberZeus cybercrime gang, was arrested in Geneva last month. [.].

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Keeping one step ahead of Black Friday cyber threats

Digital Shadows

The tail end of the calendar year represents arguably the most important period for retailers and companies working in e-commerce, The post Keeping one step ahead of Black Friday cyber threats first appeared on Digital Shadows.

article thumbnail

Microsoft and NVIDIA collaborate to build AI Supercomputer in the Cloud

CyberSecurity Insiders

Microsoft has announced that it is going to collaborate with GPU maker NVIDIA to build an Artificial Intelligence powered Supercomputer in the Azure cloud. An agreement was made on this note in September this year and information is out that the ‘Supercomp’ will be made with a stack of GPUs, networking hardware and AI software exclusively developed by the engineers from respective companies.

article thumbnail

Ukraine's 'IT Army' Stops 1,300 Cyberattacks in 8 Months of War

Dark Reading

President Zelensky offers hard-won Ukrainian cybersecurity expertise to other countries that want to protect citizen populations.

article thumbnail

3 Ways Software Licensing Eliminates Vulnerabilities to Enhance Security

IT Security Guru

In the digital era, various software is widely used to accomplish personal and enterprise tasks. Most software requires the user’s consent to access its full functionality. While you may entertain the idea of using free tools, unlicensed software can expose your organization to various security and financial risks. To enhance security and efficiency, software licensing is vital in today’s business landscape.

Software 112
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Transform Any Place into a Smart Space

Tech Republic Security

Transform rooms, buildings, and spaces into assets that inform new insights, inspire collaboration, and drive efficiencies through automation and analytics. With our best-in-class, cloud-first technologies, Cisco Meraki removes complexity so you can focus on employees, customers, and business. We bring IT, IoT, and physical environments together so all IT teams can bring automated smart spaces.

IoT 112
article thumbnail

Detecting and Defending Against DLL Sideloading Attacks

Security Boulevard

Many published security vulnerabilities and attacks are over-hyped; however, dynamic-link library (DLL) sideloading, also known as DLL hijacking, often fails to receive the recognition it deserves. These flaws are unappreciated gems for digital adversaries due to their widespread nature and ease of exploit development. In fact, many Windows services are vulnerable to these attacks today.

article thumbnail

Police dismantle pirated TV streaming network with 500,000 users

Bleeping Computer

The Spanish police have dismantled a network of pirated streaming sites that illegally distributed content from 2,600 TV channels and 23,000 movies and series to roughly 500,000 users. [.].

article thumbnail

China-Based Billbug APT Infiltrates Certificate Authority

Dark Reading

Access to digital certificates would allow the Chinese-speaking espionage group to sign its custom malware and skate by security scanners.

Malware 104
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Updated RapperBot malware targets game servers in DDoS attacks

Bleeping Computer

The Mirai-based botnet 'RapperBot' has re-emerged via a new campaign that infects IoT devices for DDoS (Distributed Denial of Service) attacks against game servers. [.].

DDOS 99
article thumbnail

Firefox fixes fullscreen fakery flaw – get the update now!

Naked Security

What's so bad about a web page going fullscreen without warning you first?

99
article thumbnail

UN’s International Day of Tolerance is a good reminder that workforce diversity should be 365-day goal

Cisco Security

Since 1996, United Nations members have commemorated Nov. 16 as International Day of Tolerance. As a word, tolerance can mean different things to different people and cultures. The UN defines tolerance as: “respect, acceptance and appreciation of the rich diversity of our world’s cultures, our forms of expression and ways of being human.” I define it slightly differently.

article thumbnail

Billbug Threat Group Ongoing Campaign Unveiled

Heimadal Security

The threat actor called Billbug (a.k.a. Thrip, Lotus Blossom, Spring Dragon) is responsible for a campaign that targeted a certificate authority, government agencies, and defense organizations in multiple countries in Asia. It is believed that the hacking group, which has been operating since 2009, is a state-sponsored group working for China. Details about the Campaign […].

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!