Sat.Sep 18, 2021 - Fri.Sep 24, 2021

article thumbnail

FBI Had the REvil Decryption Key

Schneier on Security

The Washington Post reports that the FBI had a decryption key for the REvil ransomware, but didn’t pass it along to victims because it would have disrupted an ongoing operation. The key was obtained through access to the servers of the Russia-based criminal gang behind the July attack. Deploying it immediately could have helped the victims, including schools and hospitals, avoid what analysts estimate was millions of dollars in recovery costs.

article thumbnail

Does Your Organization Have a Security.txt File?

Krebs on Security

It happens all the time: Organizations get hacked because there isn’t an obvious way for security researchers to let them know about security vulnerabilities or data leaks. Or maybe it isn’t entirely clear who should get the report when remote access to an organization’s internal network is being sold in the cybercrime underground.

Retail 298
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to create Let's Encrypt SSL certificates with acme.sh on Linux

Tech Republic Security

Issuing and installing SSL certificates doesn't have to be a challenge, especially when there are tools like acme.sh available. Jack Wallen shows you how to install and use this handy script.

article thumbnail

Researcher drops three iOS zero-days that Apple refused to fix

Bleeping Computer

Proof-of-concept exploit code for three iOS zero-day vulnerabilities (and a fourth one patched in July) was published on GitHub after Apple delayed patching and failed to credit the researcher. [.].

145
145
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

The Proliferation of Zero-days

Schneier on Security

The MIT Technology Review is reporting that 2021 is a blockbuster year for zero-day exploits: One contributing factor in the higher rate of reported zero-days is the rapid global proliferation of hacking tools. Powerful groups are all pouring heaps of cash into zero-days to use for themselves — and they’re reaping the rewards. At the top of the food chain are the government-sponsored hackers.

Hacking 260
article thumbnail

Bug in macOS Finder allows remote code execution

We Live Security

While Apple did issue a patch for the vulnerability, it seems that the fix can be easily circumvented. The post Bug in macOS Finder allows remote code execution appeared first on WeLiveSecurity.

145
145

More Trending

article thumbnail

New macOS zero-day bug lets attackers run commands remotely

Bleeping Computer

Security researchers disclosed today a new vulnerability in Apple's macOS Finder, which makes it possible for attackers to run arbitrary commands on Macs running any macOS version up to the latest release, Big Sur. [.].

145
145
article thumbnail

Alaska’s Department of Health and Social Services Hack

Schneier on Security

Apparently, a nation-state hacked Alaska’s Department of Health and Social Services. Not sure why Alaska’s Department of Health and Social Services is of any interest to a nation-state, but that’s probably just my failure of imagination.

Hacking 244
article thumbnail

European police dismantle cybercrime ring with ties to Italian Mafia

We Live Security

The group used phishing, BEC and other types of attacks to swindle victims out of millions. The post European police dismantle cybercrime ring with ties to Italian Mafia appeared first on WeLiveSecurity.

article thumbnail

Managing change in AI: Don't forget about your staff's needs and abilities

Tech Republic Security

When change affects people in your organization, remember that you have a wealth of talent that needn't go to waste. Consider re-skilling to meet the company's needs as well as the employees'.

191
191
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Windows 11 is no longer compatible with Oracle VirtualBox VMs

Bleeping Computer

Windows 11 is no longer compatible with the immensely popular Oracle VirtualBox virtualization platform after Microsoft changed its hardware requirement policies for virtual machines. [.].

145
145
article thumbnail

Securing the Edge in the Supply Chain

Security Boulevard

The supply chain is something most people take for granted—until something goes wrong. The pandemic highlighted just how quickly business can grind to a halt if the supply chain is disrupted. Organizations have found that edge computing makes the supply chain run more efficiently, but this move to the edge requires a new approach to. The post Securing the Edge in the Supply Chain appeared first on Security Boulevard.

IoT 143
article thumbnail

New Mac malware masquerades as iTerm2, Remote Desktop and other apps

Malwarebytes

Last week, security researcher Patrick Wardle released details of a new piece of malware masquerading as the legitimate app iTerm2. The malware was discovered earlier the same day by security researcher Zhi ( @CodeColorist on Twitter), and detailed on a Chinese-language blog. (For those who don’t speak Chinese, Safari seems to do a fair job of translating it.). iTerm2 is a legitimate replacement for the macOS Terminal app, offering some powerful features that Terminal does not.

Malware 141
article thumbnail

Are VPNs still the best solution for security?

Tech Republic Security

Cybersecurity professionals rely on VPNs to secure remote endpoints with an organization's home network. One expert suggests there is a better, simpler and safer approach to accomplish the same thing.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Hackers are scanning for VMware CVE-2021-22005 targets, patch now!

Bleeping Computer

Threat actors have already started targeting Internet-exposed VMware vCenter servers unpatched against a critical arbitrary file upload vulnerability patched yesterday that could lead to remote code execution. [.].

Internet 144
article thumbnail

Why Edward Snowden is urging users to stop using ExpressVPN?

Security Affairs

The popular whistleblower Edward Snowden recommends customers of ExpressVPN VPN service to stop using it. Last week the Israeli cybersecurity firm Kape Technologies has acquired the industry’s leading virtual private networks ExpressVPN, as part of a $936 million deal. Kape announced that the acquisition will more than double its overall customer base, from almost 3 million customers to more than 6 million.

article thumbnail

Ransomware Attacks Growing More Sophisticated

Security Boulevard

Cybercriminals attacked with gusto in the first half of 2021 and attacks show no signs of slowing down. In just the first half of the year, malicious actors exploited dangerous vulnerabilities across different types of devices and operating systems, leading to major attacks that shut down fuel networks and extracted millions from enterprises. These were.

article thumbnail

How to secure SSH logins with port knocking

Tech Republic Security

Knock, knock. who's there? SSH. SSH who? You need to lock down your servers so that only you have access via SSH. One way to help that is with knockd. Jack Wallen shows you how.

182
182
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Researchers compile list of vulnerabilities abused by ransomware gangs

Bleeping Computer

Security researchers are working on compiling an easy to follow list of initial access attack vectors ransomware gangs and their affiliates are using to breach victims' networks. [.].

article thumbnail

New Guidelines on Remote Assessments

PCI perspectives

Today, the Council has published “ PCI SSC Remote Assessment Guidelines and Procedures ”. These Guidelines define the principles and procedures for the appropriate use of remote assessments for PCI SSC standards when an onsite assessment is not possible. Here we interview Emma Sutcliffe, SVP Standards Officer on how the industry can use these guidelines to support secure remote assessment practices.

137
137
article thumbnail

Cybersecurity Leaders on Insider Threat Awareness Month

Security Boulevard

September marks the third annual National Insider Threat Awareness Month, launched by various federal agencies to highlight the growing danger insider threats pose to national security. Though the initiative has successfully increased awareness of the risks associated with insider threats, many organizations remain susceptible to attacks. In fact, 60% of organizations have more than 20.

article thumbnail

Windows 11 prep: How to convert MBR hard drive partitions to GPT

Tech Republic Security

For added security, Windows 11 will forgo the older MBR partition scheme and use GPT instead. That may require users to convert their older hard drives. Here is how to do it.

181
181
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Microsoft Exchange Autodiscover bugs leak 100K Windows credentials

Bleeping Computer

Bugs in the implementation of Microsoft Exchange's Autodiscover feature have leaked approximately 100,000 login names and passwords for Windows domains worldwide. [.].

Passwords 145
article thumbnail

The new math of cybersecurity value

CSO Magazine

Jenai Marinkovic doesn’t put much stock into figures that show how many attacks she and her security team have stopped. Those numbers, she says, really don’t provide any insights. “Saying we blocked a million doesn’t tell us anything. It doesn’t communicate enough to other executives,” says Marinkovic, who provides virtual CISO services through Tiro Security and serves on the Emerging Trends Working Group with the IT governance association ISACA. [ Learn 12 tips for effectively presenting cybers

article thumbnail

Patch now! Insecure Hikvision security cameras can be taken over remotely

Malwarebytes

In a detailed post on Github , security researcher Watchful_IP describes how he found that the majority of the recent camera product ranges of Hikvision cameras are susceptible to a critical, unauthenticated, remote code execution (RCE) vulnerability, even with the latest firmware. Hikvision. Hangzhou Hikvision Digital Technology Co., Ltd. engages in the development, production, and sale of security products.

Firmware 137
article thumbnail

Here's how to become an in-demand cybersecurity expert

Tech Republic Security

Just a couple of years of IT experience is all that's necessary to break into the cybersecurity field with this self-paced training.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Emergency Google Chrome update fixes zero-day exploited in the wild

Bleeping Computer

Google has released Chrome 94.0.4606.61 for Windows, Mac, and Linux, an emergency update addressing a high-severity zero-day vulnerability exploited in the wild. [.].

145
145
article thumbnail

BlackMatter Ransomware Analysis; The Dark Side Returns

McAfee

BlackMatter is a new ransomware threat discovered at the end of July 2021. This malware started with a strong group of attacks and some advertising from its developers that claims they take the best parts of other malware, such as GandCrab , LockBit and DarkSide , despite also saying they are a new group of developers. We at McAfee Enterprise Advanced Threat Research (ATR), have serious doubts about this last statement as analysis shows the malware has a great deal in common with DarkSide, the m

article thumbnail

FamousSparrow: A suspicious hotel guest

We Live Security

Yet another APT group that exploited the ProxyLogon vulnerability in March 2021. The post FamousSparrow: A suspicious hotel guest appeared first on WeLiveSecurity.

Malware 142
article thumbnail

Here's a fix for open source supply chain attacks

Tech Republic Security

Commentary: Open source has never been more popular or more under attack, but there's something cloud providers can do to make OSS more secure.

190
190
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.