Sat.Dec 25, 2021 - Fri.Dec 31, 2021

article thumbnail

Apple AirTags Are Being Used to Track People and Cars

Schneier on Security

This development suprises no one who has been paying attention: Researchers now believe AirTags, which are equipped with Bluetooth technology, could be revealing a more widespread problem of tech-enabled tracking. They emit a digital signal that can be detected by devices running Apple’s mobile operating system. Those devices then report where an AirTag has last been seen.

Mobile 300
article thumbnail

Weekly Update 276

Troy Hunt

2021 Dumpster fire? Harsh, but fair and I shall keep this 3D-printed reminder handy and hope I don't end up needing to print a 2022 version! So many times throughout this week's video I came back to that theme. But hey, there was some positive stuff too, not least the bits about some of the wonderful organisations I've worked with this year, bought products from or otherwise just been a big part of my digital life in 2021.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Check for Log4j vulnerabilities with this simple-to-use script

Tech Republic Security

If you're not certain whether your Java project is free from Log4j vulnerabilities, you should try this easy-to-use scanning tool immediately.

211
211
article thumbnail

T-Mobile says new data breach caused by SIM swap attacks

Bleeping Computer

T-Mobile confirmed that recent reports of a new data breach are linked to notifications sent to a "very small number of customers" that they fell victim to SIM swap attacks. [.].

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

22 cybersecurity statistics to know for 2022

We Live Security

As we usher in the New Year, let’s take a look at some statistics that will help you stay up-to-date on recent cybersecurity trends. The post 22 cybersecurity statistics to know for 2022 appeared first on WeLiveSecurity.

article thumbnail

Top DevOps Trends That Will Dominate in 2022

Security Boulevard

The post Top DevOps Trends That Will Dominate in 2022 appeared first on PeoplActive. The post Top DevOps Trends That Will Dominate in 2022 appeared first on Security Boulevard.

144
144

More Trending

article thumbnail

Firmware attack can drop persistent malware in hidden SSD area

Bleeping Computer

Korean researchers have developed a set of attacks against some solid-state drives (SSDs) that could allow planting malware in a location that's beyond the reach of the user and security solutions. [.].

Firmware 145
article thumbnail

4 ways employee home networks and smart devices change your threat model

CSO Magazine

Many employees at businesses worldwide have been forced to work from home because of COVID-19 related social distancing mandates. The security of employee home networks, and of the devices connected to them, are becoming increasingly important considerations for organizations that need to continue to support a large remote workforce for the foreseeable future.

article thumbnail

Cybersecurity Predictions for 2022: Stay Ahead of Threats

Security Boulevard

What do you think will happen next in the domain of cybersecurity? Which new developments or challenges will become the talk of the town in the year ahead? Who will make the most progress in the constant war waged between cybercriminals and organizations worldwide? When it comes to cybersecurity, it always pays to stay prepared. […]. The post Cybersecurity Predictions for 2022: Stay Ahead of Threats appeared first on Kratikal Blogs.

article thumbnail

The dangers of dark data: How to manage it and mitigate the risks

Tech Republic Security

Dark data is a major challenge in enterprises, and it's not going away soon. Fortunately, there are ways to reduce dark data and the risks that come with it.

Risk 177
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

LastPass users warned their master passwords are compromised

Bleeping Computer

Many LastPass users report that their master passwords have been compromised after receiving email warnings that someone tried to use them to log into their accounts from unknown locations. [.].

Passwords 145
article thumbnail

Chinese APT Hackers Used Log4Shell Exploit to Target Academic Institution

The Hacker News

A never-before-seen China-based targeted intrusion adversary dubbed Aquatic Panda has been observed leveraging critical flaws in the Apache Log4j logging library as an access vector to perform various post-exploitation operations, including reconnaissance and credential harvesting on targeted systems.

article thumbnail

Best of 2021 – What We Can Learn From the 2021 Microsoft Data Breach

Security Boulevard

In this blog, we’ll review the details of the most recent breach against the Microsoft Exchange Server. However, this blog’s point is that these forms of cyber attacks will continue and could likely accelerate. Trying to react after the fact is not the way to do business. If your toolsets or MSSP services don’t enable you to automatically detect and stop these types of sophisticated intrusion attacks, such as the recent Solarwinds attack, or whatever the next attack is—you have the wrong approac

article thumbnail

Tips for providing digital security benefits to employees

Tech Republic Security

Many employers are now offering digital security benefits to help protect their employees. Learn about such arrangements and see how you can get started implementing them.

167
167
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Log4j 2.17.1 out now, fixes new remote code execution bug

Bleeping Computer

Apache has released another Log4j version, 2.17.1 fixing a newly discovered remote code execution (RCE) vulnerability in 2.17.0, tracked as CVE-2021-44832. Prior to today, 2.17.0 was the most recent version of Log4j and deemed the safest release to upgrade to, but that advice has now evolved. [.].

145
145
article thumbnail

HP iLO devices loaded with data wiping malware

CyberSecurity Insiders

Iranian Cybersecurity firm Amnpardaz has released a security report stating that HP iLO devices were loaded with a data wiping malware dubbed iLOBleed. Technically speaking, it is actually a malicious software rootkit that is loaded onto the firmware operating on the remote server management processors dubbed Integrated Lights-out(iLO). HP iLO are used on blade servers and Proliant servers to assist the admin in doing remote operations such as maintenance, software upgrade, security update and r

Malware 140
article thumbnail

AppSec and Software Community Respond to Log4j

Security Boulevard

The application security and the open source software communities rose to the challenge of the Java Log4j vulnerability, patching software, sharing information and providing mitigations and tools. We aren’t out of the woods yet, but their actions so far have been inspiring. What Happened? The new Log4j vulnerability, dubbed Log4Shell, has put the world on.

Software 139
article thumbnail

How to install the Pritunl VPN server on AlmaLinux

Tech Republic Security

If you're looking for a VPN server to host in-house, look no further than the AlmaLinux/Pritunl combination. See how easy it is to get this service up and running.

VPN 167
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

RedLine malware shows why passwords shouldn't be saved in browsers

Bleeping Computer

The RedLine information-stealing malware targets popular web browsers such as Chrome, Edge, and Opera, demonstrating why storing your passwords in browsers is a bad idea. [.].

Passwords 145
article thumbnail

Cyber Threat to Healthcare and Corona Virus Vaccine supply

CyberSecurity Insiders

Amid fears that the newly mutated & detected Omicron variant of Corona could trigger a lockdown across the world, security experts warn that some group of threat actors probably funded by adversary governments are threatening to disrupt the healthcare services and vaccine supply meant to contain the spread of COVID-19 on a global note. According to a study made by researchers from Barracuda Networks, hospitals and healthcare organizations are at a greater risk of being cyber attacked in 2022

article thumbnail

What most cloud-using CIOs want in 2022

InfoWorld on Security

Ten years ago, many CIOs had a negative opinion about cloud computing; few CIOs landed on the positive side. Cloud subject matter experts like me got walked out of the building on a regular basis. These days it’s a career killer to not leverage cloud computing. Most CIOs now have at least 20% of their applications and data moved to the cloud with 10% to 15% scheduled to move in the next year or so. [ InfoWorld’s 2021 Technology of the Year Award winners: The best software development, cloud com

article thumbnail

Get a lifetime of protection for your files and sensitive data for only $90

Tech Republic Security

Enjoy the peace of mind that comes from having a lifetime backup plan and VPN subscription — at a price you can afford.

VPN 192
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Netgear leaves vulnerabilities unpatched in Nighthawk router

Bleeping Computer

Researchers have found half a dozen high-risk vulnerabilities in the latest firmware version for the Netgear Nighthawk R6700v3 router. At publishing time the flaws remain unpatched. [.].

Firmware 144
article thumbnail

Russia slaps $100m fine on Google America

CyberSecurity Insiders

Google, the American web search giant, was technically penalized $100m by Russian government for failing to adhere to its state prevailing laws. Sources state that the Putin led government decided to impose a hefty fine on Google, as it failed to remove the content that was deemed to be inappropriate to Russian web service seekers. Thus, the announced penalty is the largest fine ever slapped by a Russian court in the history and will represent over 6.7% revenue earned by the internet juggernaut

Media 137
article thumbnail

A Toast to the Cybersecurity Incidents of 2021

Security Boulevard

Let’s take a Cyber Drink to 2021 Cybersecurity professionals have been put in the spotlight this year. We applaud your hard work and service to protect society as the threats only get more sophisticated and the consequences become more frightening. Gone are the days when cybersecurity could operate in a silo. It’s now a business. Read article > The post A Toast to the Cybersecurity Incidents of 2021 appeared first on Axio.

article thumbnail

New iLOBleed Rootkit Targeting HP Enterprise Servers with Data Wiping Attacks

The Hacker News

A previously unknown rootkit has been found setting its sights on Hewlett-Packard Enterprise's Integrated Lights-Out (iLO) server management technology to carry out in-the-wild attacks that tamper with the firmware modules and completely wipe data off the infected systems.

Firmware 133
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Fintech firm hit by log4j hack refuses to pay $5 million ransom

Bleeping Computer

One of the largest Vietnamese crypto trading platforms, ONUS, recently suffered a cyber attack on its payment system running a vulnerable Log4j version. Soon enough, threat actors approached ONUS to extort $5 million and threatened to publish the customer data should ONUS refuse to comply. [.].

article thumbnail

How to implant a malware in hidden area of SSDs with Flex Capacity feature

Security Affairs

Researchers devised a series of attacks against SSDs that could allow to implant malware in a location that is not monitored by security solutions. Korean researchers devised a series of attacks against solid-state drives (SSDs) that could allow to implant malware in specific memory locations bypassing security solutions. The attacks work against drives with flex capacity features and allow to implant a malicious code in a hidden area of SSDs called over-provisioning.

Malware 137
article thumbnail

Aquatic Panda found stealing industrial intelligence and military secrets

CyberSecurity Insiders

Cybersecurity researchers from CrowdStrike have discovered that China funded hacking group Aquatic Panda was busy indulging in spying and espionage activities related to industrial intelligence and military secrets. Researchers from the security firm argue that said threat group was actively taking part in intelligence collection since May 2020, when almost the entire world was busy jostling with COVID-19 pandemic propelled lockdown and aftermath consequences.

article thumbnail

The Log4j Flaw Will Take Years to be Fully Addressed

Dark Reading

Over 80% of Java packages stored on Maven Central Repository have log4j as an indirect dependency, with most of them burying the vulnerable version five levels deep, says Google's Open Source Insights Team.

134
134
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.