Wed.Nov 16, 2022

article thumbnail

Russian Software Company Pretending to Be American

Schneier on Security

Computer code developed by a company called Pushwoosh is in about 8,000 Apple and Google smartphone apps. The company pretends to be American when it is actually Russian. According to company documents publicly filed in Russia and reviewed by Reuters, Pushwoosh is headquartered in the Siberian town of Novosibirsk, where it is registered as a software company that also carries out data processing.

Software 267
article thumbnail

Disneyland Malware Team: It’s a Puny World After All

Krebs on Security

A financial cybercrime group calling itself the Disneyland Team has been making liberal use of visually confusing phishing domains that spoof popular bank brands using Punycode , an Internet standard that allows web browsers to render domain names with non-Latin alphabets like Cyrillic. The Disneyland Team’s Web interface, which allows them to interact with malware victims in real time to phish their login credentials using phony bank websites.

Malware 257
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Get elite identity theft protection from a top-rated provider

Tech Republic Security

Prevent cybercriminals from stealing your identity by acting on this great deal for IDX, which will monitor the Dark Web, your social media accounts and more for suspicious activity and help you recover your identity, if needed. The post Get elite identity theft protection from a top-rated provider appeared first on TechRepublic.

article thumbnail

Privacy Hits a Low at TikTok, Twitter

Security Boulevard

Privacy on social media has taken a hit this month, which should surprise no one. Just days after Elon Musk took over Twitter, the platform’s chief privacy officer resigned, as did others germane to the company’s safety and security. That was on the heels of reports that TikTok’s privacy policy shows that Chinese staff can. The post Privacy Hits a Low at TikTok, Twitter appeared first on Security Boulevard.

Media 138
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Open banking: Tell me what you buy, and I’ll tell you who you are

We Live Security

The convenience with which you manage all your financial wants and needs may come at a cost. The post Open banking: Tell me what you buy, and I’ll tell you who you are appeared first on WeLiveSecurity.

Banking 138
article thumbnail

F5 fixed 2 high-severity Remote Code Execution bugs in its products

Security Affairs

Researchers at cybersecurity firm Rapid7 have identified several vulnerabilities and other potential security issues affecting F5 products. Rapid7 researchers discovered several vulnerabilities in F5 BIG-IP and BIG-IQ devices running a customized distribution of CentOS. The experts also discovered several bypasses of security controls that the security vendor F5 does not recognize as exploitable vulnerabilities.

More Trending

article thumbnail

DuckDuckGo now lets all Android users block trackers in their apps

Bleeping Computer

DuckDuckGo for Android's 'App Tracking Protection' feature has reached open beta, allowing all Android users to block third-party trackers across all their installed apps. [.].

Mobile 135
article thumbnail

Higher Education Organization Improves Cybersecurity Posture with NodeZero

Security Boulevard

When the director of technology for a higher education organization went looking for a better way to identify and prioritize security weaknesses on the school’s servers and networks, his first interaction with Horizon3.ai and NodeZero started off with an impressive bang. “I wanted to see proof of concept, and Horizon3.ai solved one of our biggest security holes because of that PoC,”.

Education 130
article thumbnail

US govt: Iranian hackers breached federal agency using Log4Shell exploit

Bleeping Computer

The FBI and CISA revealed in a joint advisory published today that an unnamed Iranian-backed threat group hacked a Federal Civilian Executive Branch (FCEB) organization to deploy XMRig cryptomining malware. [.].

Malware 135
article thumbnail

Just Published: PCI Mobile Payments on COTS

PCI perspectives

The PCI Security Standards Council (PCI SSC) has published a new standard designed to support the evolution of mobile payment acceptance solutions. PCI Mobile Payments on COTS (MPoC) builds on the existing PCI Software-based PIN Entry on COTS (SPoC) and PCI Contactless Payments on COTS (CPoC) Standards which individually address security requirements for solutions that enable merchants to accept cardholder PINs or contactless payments, using a smartphone or other commercial off-the-shelf (COTS)

Mobile 131
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Suspected Zeus cybercrime ring leader ‘Tank’ arrested by Swiss police

Bleeping Computer

Vyacheslav Igorevich Penchukov, also known as Tank and one of the leaders of the notorious JabberZeus cybercrime gang, was arrested in Geneva last month. [.].

article thumbnail

Lazarus APT uses DTrack backdoor in attacks against LATAM and European orgs

Security Affairs

North Korea-linked Lazarus APT is using a new version of the DTrack backdoor in attacks aimed at organizations in Europe and Latin America. North Korea-linked APT Lazarus is using a new version of the DTrack backdoor to attack organizations in Europe and Latin America, Kaspersky researchers warn. DTrack is a modular backdoor used by the Lazarus group since 2019 , it was employed in attacks against a wide variety of targets, from financial environments to a nuclear power plan.

article thumbnail

Police dismantle pirated TV streaming network with 500,000 users

Bleeping Computer

The Spanish police have dismantled a network of pirated streaming sites that illegally distributed content from 2,600 TV channels and 23,000 movies and series to roughly 500,000 users. [.].

article thumbnail

Keeping one step ahead of Black Friday cyber threats

Digital Shadows

The tail end of the calendar year represents arguably the most important period for retailers and companies working in e-commerce, The post Keeping one step ahead of Black Friday cyber threats first appeared on Digital Shadows.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Microsoft and NVIDIA collaborate to build AI Supercomputer in the Cloud

CyberSecurity Insiders

Microsoft has announced that it is going to collaborate with GPU maker NVIDIA to build an Artificial Intelligence powered Supercomputer in the Azure cloud. An agreement was made on this note in September this year and information is out that the ‘Supercomp’ will be made with a stack of GPUs, networking hardware and AI software exclusively developed by the engineers from respective companies.

article thumbnail

Iran-linked threat actors compromise US Federal Network

Security Affairs

Iran-linked threat actors compromised a Federal Civilian Executive Branch organization using a Log4Shell exploit and installed a cryptomining malware. According to a joint advisory published by the FBI and CISA, an Iran-linked APT group compromised a Federal Civilian Executive Branch (FCEB) organization using an exploit for the Log4Shell flaw ( CVE-2021-44228 ) and deployed a cryptomining malware.

article thumbnail

Detecting and Defending Against DLL Sideloading Attacks

Security Boulevard

Many published security vulnerabilities and attacks are over-hyped; however, dynamic-link library (DLL) sideloading, also known as DLL hijacking, often fails to receive the recognition it deserves. These flaws are unappreciated gems for digital adversaries due to their widespread nature and ease of exploit development. In fact, many Windows services are vulnerable to these attacks today.

article thumbnail

Updated RapperBot malware targets game servers in DDoS attacks

Bleeping Computer

The Mirai-based botnet 'RapperBot' has re-emerged via a new campaign that infects IoT devices for DDoS (Distributed Denial of Service) attacks against game servers. [.].

DDOS 114
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

High Severity Vulnerabilities Reported in F5 BIG-IP and BIG-IQ Devices

The Hacker News

Multiple security vulnerabilities have been disclosed in F5 BIG-IP and BIG-IQ devices that, if successfully exploited, to completely compromise affected systems. Cybersecurity firm Rapid7 said the flaws could be abused to remote access to the devices and defeat security constraints.

article thumbnail

Twitter source code indicates end-to-end encrypted DMs are coming

Bleeping Computer

Twitter is reportedly working on finally adding end-to-end encryption (E2EE) for direct messages (DMs) exchanged between users on the social media platform. [.].

article thumbnail

Beginning 2023 Google plans to rollout the initial Privacy Sandbox Beta

Security Affairs

Google announced it will roll out the Privacy Sandbox system for Android in beta to a limited number of Android 13 devices in early 2023. Google announced it will roll out the Privacy Sandbox for Android in beta to mobile devices running Android 13 starting early next year. The Privacy Sandbox aims at creating technologies to protect people’s privacy online limiting covert tracking.

Mobile 108
article thumbnail

DAST tools as force multipliers for human cybersecurity skills

Security Boulevard

Modern DAST tools help humans and technology work together at peak efficiency, allowing development and security teams to save critical time and preserve their sanity while also incrementally improving security posture and minimizing costly code rework. The post DAST tools as force multipliers for human cybersecurity skills appeared first on Invicti.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Magento stores targeted in massive surge of TrojanOrders attacks

Bleeping Computer

At least seven hacking groups are behind a massive surge in 'TrojanOrders' attacks targeting Magento 2 websites, exploiting a vulnerability that allows the threat actors to compromise vulnerable servers. [.].

Hacking 99
article thumbnail

Track this: Apple, Google hit with BIG privacy law claims

Security Boulevard

Within the space of a few days, both Google and Apple have suffered huge legal challenges. The two tech titans were accused of various privacy violations. The post Track this: Apple, Google hit with BIG privacy law claims appeared first on Security Boulevard.

article thumbnail

3 Ways Software Licensing Eliminates Vulnerabilities to Enhance Security

IT Security Guru

In the digital era, various software is widely used to accomplish personal and enterprise tasks. Most software requires the user’s consent to access its full functionality. While you may entertain the idea of using free tools, unlicensed software can expose your organization to various security and financial risks. To enhance security and efficiency, software licensing is vital in today’s business landscape.

Software 101
article thumbnail

Ukraine's 'IT Army' Stops 1,300 Cyberattacks in 8 Months of War

Dark Reading

President Zelensky offers hard-won Ukrainian cybersecurity expertise to other countries that want to protect citizen populations.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Researchers Discover Hundreds of Amazon RDS Instances Leaking Users' Personal Data

The Hacker News

Hundreds of databases on Amazon Relational Database Service (Amazon RDS) are exposing personal identifiable information (PII), new findings from Mitiga, a cloud incident response company, show.

article thumbnail

Palo Alto releases PAN-OS 11.0 Nova with new evasive malware, injection attack protection

CSO Magazine

Palo Alto Networks has announced PAN-OS 11.0 Nova, the latest version of its PAN-OS software, featuring new product updates and features. These include the Advanced WildFire cloud-delivered security service to help protect against evasive malware and the Advanced Threat Prevention (ATP) service, which protects against injection attacks. The cybersecurity vendor also revealed new web proxy support and enhanced cloud access security broker (CASB) integration with new SaaS security posture manageme

Malware 93
article thumbnail

Iranian Hackers Compromised a U.S. Federal Agency’s Network Using Log4Shell Exploit

The Hacker News

Iranian government-sponsored threat actors have been blamed for compromising a U.S. federal agency by taking advantage of the Log4Shell vulnerability in an unpatched VMware Horizon server. The details, which were shared by the U.S.

article thumbnail

Offboarding processes pose security risks as job turnover increases: Report

CSO Magazine

Research from YouGov finds that poor offboarding practices across industries including healthcare and tech are putting companies at risk, including for loss of end-user devices and unauthorized SaaS application use.

Risk 98
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.