Fri.Feb 12, 2021

article thumbnail

Medieval Security Techniques

Schneier on Security

Sonja Drummer describes (with photographs) two medieval security techniques. The first is a for authentication: a document has been cut in half with an irregular pattern, so that the two halves can be brought together to prove authenticity. The second is for integrity: hashed lines written above and below a block of text ensure that no one can add additional text at a later date.

article thumbnail

Why cybersecurity insurance may be worth the cost

Tech Republic Security

Cybersecurity insurance can compensate you in the event of a cyberattack. But how do you determine the right policy for your needs?

Insurance 218
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attack against Florida Water Treatment Facility

Schneier on Security

A water treatment plant in Oldsmar, Florida, was attacked last Friday. The attacker took control of one of the systems, and increased the amount of sodium hydroxide — that’s lye — by a factor of 100. This could have been fatal to people living downstream, if an alert operator hadn’t noticed the change and reversed it. We don’t know who is behind this attack.

article thumbnail

How micro-drilling can enhance your cybersecurity training

Tech Republic Security

Agile thinking is important in dealing with cyberattacks. Read one psychologist's tips for cybersecurity professionals on how to adapt and stop the attackers.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

After hackers blackmailed their clients, Finnish therapy firm declares bankruptcy

Hot for Security

Highly sensitive notes from therapy sessions were published online in an attempt to blackmail patients Hackers bragged about the poor state of firm’s security. Vastaamo, the Finnish psychotherapy practice that covered up a horrific security breach which resulted in patients receiving blackmail threats, has declared itself bankrupt. Vastaamo’s problems first began in 2018, when it discovered that a database of customer details and – most shockingly – notes from therapy ses

article thumbnail

US Court system demands massive changes to court documents after SolarWinds hack

Tech Republic Security

Multiple senators have demanded a hearing on what court officials know about the hackers' access to sensitive filings. The effects could make accessing documents harder for lawyers.

Hacking 191

LifeWorks

More Trending

article thumbnail

Yandex said it caught an employee selling access to users' inboxes

Zero Day

The Russian company said the employee sold access to 4,887 user email accounts.

article thumbnail

“Microosft”. Patch Tuesday goof points users to typo-bait website

Graham Cluley

Microsoft made an embarrassing goof in the release notes it published for the Patch Tuesday security updates it issued earlier this week.

144
144
article thumbnail

Apple will proxy Safe Browsing traffic on iOS 14.5 to hide user IPs from Google

Zero Day

iOS 14.5 is currently in beta.

145
145
article thumbnail

DDoS explained: How distributed denial of service attacks are evolving

CSO Magazine

What is a DDoS attack? A distributed denial of service (DDoS) attack is when an attacker, or attackers, attempt to make it impossible for a service to be delivered. This can be achieved by thwarting access to virtually anything: servers, devices, services, networks, applications, and even specific transactions within applications. In a DoS attack, it’s one system that is sending the malicious data or requests; a DDoS attack comes from multiple systems.

DDOS 142
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Yandex security team caught admin selling access to users’ inboxes

Security Affairs

Russian internet and search company Yandex discloses a data breach, a system administrator was selling access to thousands of user mailboxes. Russian search engine and internet provider Yandex discloses a data breach, the company revealed that one of its system administrators was caught selling access to 4,887 user email accounts. The security incident was discovered during a routine screening by its internal security team, an internal investigation is still ongoing. “An internal investiga

article thumbnail

Microsoft said the number of web shells has doubled since last year

Zero Day

Microsoft says it's seeing around 140,000 web shells a month, up from roughly 77,000 last August.

140
140
article thumbnail

Red Team / Blue Team Testing – The Big Picture

CyberSecurity Insiders

Ever since offensive security testing began, we have expected that the test or simulation will find something. Even if a pen tester doesn’t uncover an issue, the best ones can always achieve success through phishing or social engineering of your organization’s employees. In the same way, Red Team-Blue Team exercises highlight the near impossibility of foiling a motivated attacker – the odds of success heavily favor the attacker and make it extremely difficult for the defender.

article thumbnail

Fallen victim to online fraud? Here’s what to do…

Naked Security

Practical tips on how to avoid getting scammed in the first place, as well as what to do if it does happen.

Scams 139
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The “P” in Telegram stands for Privacy

Security Affairs

Security expert Dhiraj Mishra analyzed the popular instant messaging app Telegram and identified some failures in terms of handling the users’ data. Summary: While understanding the implementation of various security and privacy measures in Telegram, I identified that telegram fails again in terms of handling the users data. My initial study started with understanding how self-destructing messages work in the secret chats option, telegram says that “ The clock starts ticking the mom

Hacking 138
article thumbnail

CISA Warns of Incoming Valentine’s Day Romance Scams

Hot for Security

The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding the upcoming Valentine’s Day, telling people to watch out for romance scams. If there’s money to be made, criminals will find a way to take advantage of any situation. Since Valentine’s Day is one of the year’s biggest celebrations, scammers, fraudsters, and criminals of all kinds come out of the woodwork with new tools.

Scams 137
article thumbnail

Artificial Intelligence to help against multi stage Cyber Attacks

CyberSecurity Insiders

Zero day attacks are a serious threat to computer networks, and a recent research says that the attacks can be curbed with the use of machine learning algorithms. In fact, security analysts say that the tool can prove as a cost effective solution to defend organizations from the present day cyber threats. A research carried out by Cisco Talos says that it takes approximately 15 days time for a victimized company to come out of the repercussions of cyber attacks.

article thumbnail

Secret Chat in Telegram Left Self-Destructing Media Files On Devices

The Hacker News

Popular messaging app Telegram fixed a privacy-defeating bug in its macOS app that made it possible to access self-destructing audio and video messages long after they disappeared from secret chats. The vulnerability was discovered by security researcher Dhiraj Mishra in version 7.3 of the app, who disclosed his findings to Telegram on December 26, 2020.

Media 137
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Hackers Sell ‘Cyberpunk 2077’ Data and Source for Millions

Security Boulevard

Ransomware scrotes have followed through on their threat to auction off the data they stole from the maker of Cyberpunk 2077. The post Hackers Sell ‘Cyberpunk 2077’ Data and Source for Millions appeared first on Security Boulevard.

article thumbnail

Are There Really “Quick Wins” for Your Security Program?

Cisco Security

We’re always looking for the “quick wins” in security — whether it’s the magic blinky box that you drop into the right place in your network and it stops all the bad stuff (let me know if you find one of those), or the secret incantation that you can perform that doesn’t cost money but adds protection to your armor. The “one weird trick” sometimes leads to clicks; I once got the head of one of the biggest tech companies on the planet to click on my analy

Software 135
article thumbnail

Florida Water Plant Hack: Leaked Credentials Found in Breach Database

Threatpost

Researchers discovered credentials for the Oldsmar water treatment facility in the massive compilation of data from breaches posted just days before the attack.

Hacking 130
article thumbnail

Who is to blame for the malicious Barcode Scanner that got on the Google Play store?

Malwarebytes

In our last blog, Barcode Scanner app on Google Play infects 10 million users with one update , we wrote about a barcode scanner found on the Google Play store that was infected with Android/Trojan.HiddenAds.AdQR. All initial signs led us to believe that LavaBird LTD was the developer of this malware, but since then, a representative from LavaBird reached out to us.

Malware 128
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Yandex suffers data breach after sysadmin sold access to user emails

Bleeping Computer

Russian internet and search company Yandex announced today that one of its system administrators had enabled unauthorized access to thousands of user mailboxes. [.].

article thumbnail

Vulnerabilities hit record high in 2020, topping 18,000

SC Magazine

Security teams were under siege last year, according to research analyzing 2020 NIST data on common vulnerabilities and exposures (CVEs) that found more security flaws – 18,103 – were disclosed in 2020 than in any other year to date. To understand the significance, there were far more “critical” and “high severity” vulnerabilities in 2020 (10,342) than the total number of all vulnerabilities recorded in 2010 (4,639), according to Redscan, which ran the analysis of NIST’s National Vulnerability D

article thumbnail

Singtel Suffers Zero-Day Cyberattack, Damage Unknown

Threatpost

The Tier 1 telecom giant was caught up in a coordinated, wide-ranging attack using unpatched security bugs in the Accellion legacy file-transfer platform.

Hacking 125
article thumbnail

Google: Gmail users from US most targeted by phishing attacks

Bleeping Computer

Google has revealed earlier this week that Gmail users from the United States are the most popular target for email-based phishing and malware attacks. [.].

Phishing 124
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Microsoft warns of the rise of web shell attacks

Security Affairs

Researchers from Microsoft are warning that the number of monthly web shell attacks has doubled since last year. Microsoft reported that the number of monthly web shell attacks has almost doubled since last year, its experts observed an average of 140,000 of these software installs on servers on a monthly basis, while in 2020 they were 77,000. “One year ago, we reported the steady increase in the use of web shells in attacks worldwide.

Media 123
article thumbnail

Telegram Didn’t Destroy Multimedia Files Sent Through Secret Chat on macOS, Researcher Finds

Hot for Security

A security researcher discovered that one of Telegram’s features on macOS that should have guaranteed complete privacy by destroying the information sent by users wasn’t working as intended. Telegram is an instant messaging application with support for all major operating systems, including macOS. While the app developers don’t boast of default end-to-end encryption for messages, they do offer a feature called ‘secret chat.

article thumbnail

Phone Company Insiders Helped Global Sim-Swapping Gang Steal Millions in Cryptocurrency

Security Boulevard

This week law enforcement agencies around the world made press releases about the arrest of SIM Swapping criminals. The UK's National Crime Agency says "eight men have been arrested in England and Scotland as part of an investigation into a series of SIM swapping attacks, in which criminals illegally gained access to the phones of high-profile victims in the US.

article thumbnail

Thales joins Google’s 5G Mobile Edge Cloud initiative

CyberSecurity Insiders

In March 2020, Google Cloud unveiled its telecom operator strategy called Global Mobile Edge Cloud (GMEC), aimed at helping Communications Service Providers (CSPs) digitally transform and harness the full potential of 5G. In parallel, Thales has deployed a large portfolio of its solutions onto Google Cloud to leverage cloud at the edge of its MNO customers’ infrastructure.

Mobile 119
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!