Tue.Apr 05, 2022

article thumbnail

GUEST ESSAY: NewsCorp hack shows cyber espionage, squelching of press freedom on the rise

The Last Watchdog

As the dust settles following the recently disclosed hack of NewsCorp , important lessons are emerging for the cybersecurity and journalism communities. Related: How China challenged Google in Operation Aurora. The Chinese government is well known for its censorship– and frequent harassment and intimidation of foreign journalists. These are the foremost reasons China is ranked fourth worst globally regarding press freedoms.

Hacking 243
article thumbnail

IRS warns consumers and businesses of common scams during tax season

Tech Republic Security

In one type of phishing attack described by the IRS, scammers pose as IRS workers to try to coax employees into sharing social security numbers or bank account details. The post IRS warns consumers and businesses of common scams during tax season appeared first on TechRepublic.

Scams 214
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA advises D-Link users to take vulnerable routers offline

Malwarebytes

On April 4 2022, the Cybersecurity & Infrastructure Security Agency (CISA) added CVE-2021-45382 to its known exploited vulnerabilities catalog. But since the affected products have reached end of life (EOL), the advice is to disconnect them, if still in use. CISA catalog. The CISA catalog of known exploited vulnerabilities was set up to list the most important vulnerabilities that have proven to pose the biggest risks.

Firmware 145
article thumbnail

Nearly two-thirds of ransomware victims paid ransoms last year

Tech Republic Security

A new report from CyberEdge group goes into detail on why businesses are more keen to pay off ransomware attackers and what can be done to increase cyber security. The post Nearly two-thirds of ransomware victims paid ransoms last year appeared first on TechRepublic.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Mailchimp Hack Causes Theft of Trezor Crypto Wallet ‘Money’

Security Boulevard

Hackers have stolen a mother lode of personal data from Intuit’s email marketing operation, Mailchimp. The post Mailchimp Hack Causes Theft of Trezor Crypto Wallet ‘Money’ appeared first on Security Boulevard.

Hacking 145
article thumbnail

5 tools to make encryption key management easier

Tech Republic Security

If you use SSH or services that require encryption keys, it can be challenging to safely store that data to allow you secure access to your accounts. Here are some services to help you keep track of them. The post 5 tools to make encryption key management easier appeared first on TechRepublic.

LifeWorks

More Trending

article thumbnail

Remote Access Trojan adds ransomware and DDoS attacks to usual bag of tricks

Tech Republic Security

Known as Borat, a new Trojan spotted by Cyble allows attackers to compile malicious code to launch ransomware campaigns and DDoS attacks on the victim’s machine. The post Remote Access Trojan adds ransomware and DDoS attacks to usual bag of tricks appeared first on TechRepublic.

DDOS 180
article thumbnail

Intel shuts down all business operations in Russia

Bleeping Computer

US chipmaker Intel announced Tuesday night that it had suspended all business operations in Russia, joining tech other companies who pulled out of the country due to the invasion of Ukraine. [.].

article thumbnail

How phishing attacks are exploiting Russia’s invasion of Ukraine

Tech Republic Security

Scams spotted by Tessian typically try to grab donations intended to support Ukrainian humanitarian efforts to combat Russia’s attack. See how these exploits work and how to avoid them. The post How phishing attacks are exploiting Russia’s invasion of Ukraine appeared first on TechRepublic.

Phishing 168
article thumbnail

Real-time is where the cybersecurity risk is

CSO Magazine

I don’t know how many times I’ve heard cybersecurity professionals say something like, “Not having multi-factor authentication is a huge risk for our organization.” The truth is, that type of statement may illustrate a control weakness, but unless the unwanted outcome is a ding in an audit report where MFA is required, that is not the real risk. The real risk is the probability of a ransomware incident, for example, or the leak of personally identifiable information (PII) from a customer databas

Risk 143
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Software security roadmaps: Secure your software without the expense

Tech Republic Security

Making your software more secure is a process that takes careful planning, a lot of collaboration, and a healthy dose of iterating as you learn more. It’s the type of journey that goes more smoothly when you have a map. SafeStack Academy’s free white paper details what software security roadmaps are, why they’re useful in. The post Software security roadmaps: Secure your software without the expense appeared first on TechRepublic.

Software 156
article thumbnail

Chinese hackers abuse VLC Media Player to launch malware loader

Bleeping Computer

Security researchers have uncovered a long-running malicious campaign from hackers associated with the Chinese government who are using VLC Media Player to launch a custom malware loader. [.].

Media 141
article thumbnail

Sophisticated phishing attacks steal Trezor’s hardware wallets

Tech Republic Security

Customers of hardware wallet provider Trezor have been targeted by a phishing scam, resulting in the theft of cryptocurrency assets. See how it works and how to protect yourself from this new threat. The post Sophisticated phishing attacks steal Trezor’s hardware wallets appeared first on TechRepublic.

Phishing 154
article thumbnail

Russia-linked Armageddon APT targets Ukrainian state organizations, CERT-UA warns

Security Affairs

Ukraine CERT-UA spotted a spear-phishing campaign conducted by Russia-linked Armageddon APT targeting local state organizations. Ukraine CERT-UA published a security advisory to warn of spear-phishing attacks conducted by Russia-linked Armageddon APT (aka Gamaredon , Primitive Bear, Armageddon, Winterflounder, or Iron Tilden) targeting local state organizations.

Phishing 139
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Colibri Loader combines Task Scheduler and PowerShell in clever persistence technique

Malwarebytes

This blog post was authored by Ankur Saini, with contributions from Hossein Jazi and Jérôme Segura. Colibri Loader is a relatively new piece of malware that first appeared on underground forums in August 2021 and was advertised to “ people who have large volumes of traffic and lack of time to work out the material “ As it names suggests, it is meant to deliver and manage payloads onto infected computers.

Malware 133
article thumbnail

Germany Shuts Down Russian Hydra Darknet Market; Seizes $25 Million in Bitcoin

The Hacker News

Germany's Federal Criminal Police Office, the Bundeskriminalamt (BKA), on Tuesday announced the official takedown of Hydra, the world's largest illegal dark web marketplace that has cumulatively facilitated over $5 billion in Bitcoin transactions to date.

Marketing 132
article thumbnail

5 Best Freelancing Job Websites For Cyber Security 

SecureBlitz

Are you thinking about what best freelancing job websites for cyber security there are? The demand for cyber security freelancing jobs is no doubt on the increase in recent times; here, sit back as we walk you through the best freelancing job websites for 2022. As a cybersecurity expert, you can find freelance jobs on. The post 5 Best Freelancing Job Websites For Cyber Security appeared first on SecureBlitz Cybersecurity.

article thumbnail

Anonymous targets the Russian Military and State Television and Radio propaganda

Security Affairs

Anonymous continues to support Ukraine against the Russian criminal invasion targeting the Russian military and propaganda. Anonymous leaked personal details of the Russian military stationed in Bucha where the Russian military carried out a massacre of civilians that are accused of having raped and shot local women and children. Leaked data include names, ranks and passport details of Russians serving in the 64 Motor Rifle Brigade which occupied Bucha prior to March 31.

Hacking 130
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Latest MITRE Endpoint Security Results Show Some Familiar Names on Top

eSecurity Planet

MITRE Engenuity has released the latest round of its ATT&CK endpoint security evaluations, and the results show some familiar names leading the pack with the most detections. The MITRE evaluations are unique in that they emulate advanced persistent threat (APT) and nation-state hacking techniques, making them different from tests that might look at static malware samples, for example.

Antivirus 130
article thumbnail

Agile Auditing: What You Need to Know

Security Boulevard

For years, compliance audits have basically been conducted the same way: create an audit plan, complete the audit. Read More. The post Agile Auditing: What You Need to Know appeared first on Hyperproof. The post Agile Auditing: What You Need to Know appeared first on Security Boulevard.

128
128
article thumbnail

Key Attributes You Need to Consider When Selecting a Cloud Security Platform

Appknox

As more and more businesses move towards cloud-based operations and embrace digital transformation, security is increasingly becoming an important question. As an enterprise migrates to the cloud, its assets and data resources need to be migrated as well, and that might expose the sensitive information.

article thumbnail

Qualys Extends Scope and Reach of EDR Cloud Service

Security Boulevard

Qualys this week updated its multi-vector endpoint detection and response (EDR) service to add additional threat-hunting and risk mitigation capabilities along with improved alert prioritization capabilities. Hiep Dang, vice president of endpoint security solutions for Qualys, said the 2.0 release of the multi-vector EDR service from Qualys now makes it easier to operationalize tactics and.

Risk 122
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Microsoft Details New Security Features for Windows 11

Dark Reading

Security features to come include a TPM-like security processor for protecting artifacts that a computer uses during the secure boot-up process, as well as a control for blocking unsigned and untrusted apps.

121
121
article thumbnail

We’re going on Tor

We Live Security

If better privacy and anonymity sound like music to your ears, you may not need to look much further than Tor Browser. Here’s what it’s like to surf the dark web using the browser. The post We’re going on Tor appeared first on WeLiveSecurity.

article thumbnail

Cash App notifies 8.2 million US customers about data breach

Bleeping Computer

Cash App is notifying 8.2 million current and former US customers of a data breach after a former employee accessed their account information. [.].

article thumbnail

Cash App customer investment data hacked

CSO Magazine

In an SEC filing made on Monday, Cash App parent company Block, Inc., said that it was working to contact roughly 8.2 million past and present customers of its investment services, as names, brokerage portfolio values and account numbers were compromised in a data breach. According to Block’s form 8-K, a employee who had regular access to the records during their employment downloaded customer records after leaving the company.

Hacking 118
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

What is Code Quality? 5 Software Development Checks You Should be Automating

Security Boulevard

Product development is a delicate balancing act of delivering new features and investing in architecture and technology, all while trying to focus on building the right product. Have you ever experienced one of these scenarios? The post What is Code Quality? 5 Software Development Checks You Should be Automating appeared first on Security Boulevard.

Software 117
article thumbnail

GitLab issues security updates; watch out for hard coded passwords

Malwarebytes

GitLab has issued several critical security updates, with users of the version control software urged to upgrade their installations as soon as possible. One of the fixes is for a hard coded password issue. What is distributed version control? Distributed version control is a way for an organisation’s codebase to be mirrored on the devices of anyone who needs access.

Passwords 116
article thumbnail

Spring4Shell patching is going slow but risk not comparable to Log4Shell

CSO Magazine

Businesses have been at work since last week investigating whether their applications or third-party software products are vulnerable to Spring4Shell , a critical remote code execution (RCE) vulnerability impacting Spring Framework, one of the most popular development frameworks for Java applications. While exploitation attempts have already been observed in the wild, the rate at which developers are updating their Spring instances appears to be slow going.

Risk 116
article thumbnail

'Human Behavior' Security Startup Nets $7M in Seed

Dark Reading

Nudge Security plans a general launch of its cloud-based service later this year.

116
116
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!