Sat.Oct 16, 2021 - Fri.Oct 22, 2021

article thumbnail

Problems with Multifactor Authentication

Schneier on Security

Roger Grimes on why multifactor authentication isn’t a panacea : The first time I heard of this issue was from a Midwest CEO. His organization had been hit by ransomware to the tune of $10M. Operationally, they were still recovering nearly a year later. And, embarrassingly, it was his most trusted VP who let the attackers in. It turns out that the VP had approved over 10 different push-based messages for logins that he was not involved in.

article thumbnail

Pwned - The Collected Blog Posts of Troy Hunt (Preview)

Troy Hunt

We choose this photo for the cover because this was when it all started. 18-year old Troy, having just discovered the web in early 1995 and chomping at the bit to do something with it. The full tale of what I first did (and how disastrous it ultimately became), is up front early in the book so I won't relay it here, but it's quite the story.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Do You Trust Your SIEM?

Anton on Security

My admittedly epic (but dated) post “Security Correlation Then and Now: A Sad Truth About SIEM” mentioned the issue of TRUST as it applies to SIEM. Specifically, as a bit of a throwaway comment, I said “people write stupid string-matching and regex-based content because they trust it. They do not?—?en masse?—?trust the event taxonomies if their lives and breach detections depend on it.

Passwords 257
article thumbnail

Gartner analyst: 12 technologies to accelerate growth, engineer trust and sculpt change in 2022

Tech Republic Security

CIOs must prioritize the same business imperatives and find the IT force multipliers to enable growth and innovation, according to a Gartner analyst during Gartner's IT Symposium.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Nation-State Attacker of Telecommunications Networks

Schneier on Security

Someone has been hacking telecommunications networks around the world: LightBasin (aka UNC1945) is an activity cluster that has been consistently targeting the telecommunications sector at a global scale since at least 2016, leveraging custom tools and an in-depth knowledge of telecommunications network architectures. Recent findings highlight this cluster’s extensive knowledge of telecommunications protocols, including the emulation of these protocols to facilitate command and control (C2

article thumbnail

US Government warns of BlackMatter ransomware attacks against critical infrastructure

Graham Cluley

The US Government has issued an alert to organisations about the threat posed by the BlackMatter ransomware group. Read more in my article on the Tripwire State of Security blog.

More Trending

article thumbnail

What to do if your small business is a victim of a cyberattack

Tech Republic Security

Immersed in the throes of a cyberattack is not the time to figure out how to respond. An expert offers suggestions on how to create a company-specific incident-response plan.

article thumbnail

Using Machine Learning to Guess PINs from Video

Schneier on Security

Researchers trained a machine-learning system on videos of people typing their PINs into ATMs: By using three tries, which is typically the maximum allowed number of attempts before the card is withheld, the researchers reconstructed the correct sequence for 5-digit PINs 30% of the time, and reached 41% for 4-digit PINs. This works even if the person is covering the pad with their hands.

299
299
article thumbnail

What is Magecart? How this hacker group steals payment card data

CSO Magazine

Magecart definition. Magecart is a consortium of malicious hacker groups who target online shopping cart systems, usually the Magento system, to steal customer payment card information. This is known as a supply chain attack. The idea behind these attacks is to compromise a third-party piece of software from a VAR or systems integrator or infect an industrial process unbeknownst to IT. [ How much does a data breach cost?

CSO 145
article thumbnail

A bug is about to confuse a lot of computers by turning back time 20 years

Malwarebytes

For those of you that remember the fuss about the Y2K bug , this story may sound familiar. The Cybersecurity & Infrastructure Security Agency (CISA) has issued a warning to Critical Infrastructure (CI) owners and operators, and other users who get the time from GPS, about a GPS Daemon (GPSD) bug in GPSD versions 3.20 through 3.22. Y2K. If you don’t remember the Y2K bug, let me remind you quickly.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to proactively detect and prevent ransomware attacks

Tech Republic Security

Two out of three organizations surveyed by ThycoticCentrify were hit by a ransomware attack over the past 12 months, and more than 80% reportedly opted to pay the ransom.

article thumbnail

The Missouri Governor Doesn’t Understand Responsible Disclosure

Schneier on Security

The Missouri governor wants to prosecute the reporter who discovered a security vulnerability in a state’s website, and then reported it to the state. The newspaper agreed to hold off publishing any story while the department fixed the problem and protected the private information of teachers around the state. […]. According to the Post-Dispatch, one of its reporters discovered the flaw in a web application allowing the public to search teacher certifications and credentials.

Education 285
article thumbnail

How to Remove Malware from WordPress Site (Malware Cleanup Guide)

Security Boulevard

If you suspect a hack or suspicious activity on your website, it can be a nerve-wracking experience. Until you know for sure, you cannot determine the reason, nor the solution. Wondering how to remove malware from WordPress site? Do not worry, we will help you clean malware from WordPress, determine the cause, and save you. Read more. The post How to Remove Malware from WordPress Site (Malware Cleanup Guide) appeared first on Malcare.

Malware 143
article thumbnail

Hacking gang creates fake firm to hire pentesters for ransomware attacks

Bleeping Computer

The FIN7 hacking group is attempting to join the highly profitable ransomware space by creating fake cybersecurity companies that conduct network attacks under the guise of pentesting. [.].

Hacking 145
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Microsoft bought CloudKnox because hybrid multicloud identity is complicated

Tech Republic Security

Managing passwords and privileged access is bad enough for people—but that's going to be dwarfed by the problem of dealing with non-human identities.

Passwords 202
article thumbnail

Textbook Rental Scam

Schneier on Security

Here’s a story of someone who, with three compatriots, rented textbooks from Amazon and then sold them instead of returning them. They used gift cards and prepaid credit cards to buy the books, so there was no available balance when Amazon tried to charge them the buyout price for non-returned books. They also used various aliases and other tricks to bypass Amazon’s fifteen-book limit.

Scams 276
article thumbnail

Attackers Weaponizing Zero-Days at Record Pace

Security Boulevard

Cybercriminals exploited a new remote code execution (RCE) zero-day, CVE-2021-40444, a week before a patch was released in September—that’s just one of the recent findings in a report by HP Wolf Security. On September 10, researchers discovered scripts on GitHub that automated the creation of the exploit, which ostensibly means that even less-savvy attackers can.

article thumbnail

Multi-Staged JSOutProx RAT Targets Indian Banks and Finance Companies

Quick Heal Antivirus

Quick Heal Security Labs has been monitoring various attack campaigns using JSOutProx RAT against different SMBs in. The post Multi-Staged JSOutProx RAT Targets Indian Banks and Finance Companies appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Banking 143
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

How to keep your data off the Dark Web

Tech Republic Security

Traditional security solutions are no longer enough to protect your organization from a data breach, Bitglass says.

article thumbnail

Cybersecurity careers: What to know and how to get started

We Live Security

Want to help make technology safer for everyone? Love solving puzzles? Looking for a rewarding career? Break into cybersecurity! Insights from ESET researchers Aryeh Goretsky and Cameron Camp will put you on the right track. The post Cybersecurity careers: What to know and how to get started appeared first on WeLiveSecurity.

article thumbnail

Email Cybersecurity Must Evolve to Combat Threats

Security Boulevard

Every business that takes cybersecurity seriously has a multi-layered approach to defending its uptime and data against the ocean of current threats. In 2021, those menaces range from ransomware to software supply chain attacks to breaches of cloud data repositories. To fight them, we deploy a variety of technologies in front of and inside our. The post Email Cybersecurity Must Evolve to Combat Threats appeared first on Security Boulevard.

article thumbnail

Beware of this Flubot malware that swept entire Australia

CyberSecurity Insiders

Most of the Australian mobile users who use profusely use internet have reportedly fallen prey to a malware dubbed as Flubot having potential to steal financial info and password logins from the victims’ phones. And information is out that the cyber criminals behind the spread of the Flubot malware are asking victims to download a security update to recover their device from the effects of the attack, a purported move to deepen the crisis.

Malware 139
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Tech support scams top list of latest phishing threats

Tech Republic Security

Tech support scams work because they try to trick people into believing there's a serious security crisis with their computers, says Norton Labs.

Scams 178
article thumbnail

Russian-speaking cybercrime evolution: What changed from 2016 to 2021

SecureList

Experts at Kaspersky have been investigating various computer incidents on a daily basis for over a decade. Having been in the field for so long, we have witnessed some major changes in the cybercrime world’s modus operandi. This report shares our insights into the Russian-speaking cybercrime world and the changes in how it operates that have happened in the past five years.

article thumbnail

A recipe for failure: Predictably poor passwords

We Live Security

Security professionals advise to never use ‘beef stew’ as a password. It just isn’t stroganoff. The post A recipe for failure: Predictably poor passwords appeared first on WeLiveSecurity.

Passwords 139
article thumbnail

What is Telecom LightBasin Cyber Attack

CyberSecurity Insiders

CrowdStrike security researchers have discovered that a hacking group dubbed LightBasin aka UNC1945 has been hiding in the networks of renowned telecom networks from the past 5 years, monitoring all their business operations and sending censorious data to remote servers. Revealing the same in a blog post published on Tuesday, the California based endpoint security provider revealed that the said gang of cyber criminals could have easily targeted over 13 telecom networks so far and the count migh

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Train to qualify for elite positions in the high-demand field of cybersecurity

Tech Republic Security

You don't have to go back to school or blow your budget to train for a career in cybersecurity, which is in high demand right now.

article thumbnail

Groove ransomware calls on all extortion gangs to attack US interests

Bleeping Computer

The Groove ransomware gang is calling on other extortion groups to attack US interests after law enforcement took down REvil's infrastructure last week. [.].

article thumbnail

Why Not Hold Ransomware Attackers Hostage for a Change?

Security Boulevard

Right now, companies are, for the most part, sitting ducks when it comes to ransomware. Sure, they can do things to harden their security; mitigate the problems of phishing and malware, back up their data for ultimate recovery and enhance their incident response program. There are also some things they can do to make their. The post Why Not Hold Ransomware Attackers Hostage for a Change?

article thumbnail

Ransomware spreading hackers threatening to harass employees and business partners

CyberSecurity Insiders

A new ransomware variant is in the wild and is threatening to harass employees and business partners if a ransom payment is denied. Dubbed as Yanluowang ransomware and discovered by security researchers from Broadcom Threat Hunting Team, the new file encrypting malware was found threatening the victims of launching DDoS attacks along with the usual data steal and encryption threat.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.