Tue.Jul 23, 2024

article thumbnail

Phish-Friendly Domain Registry “.top” Put on Notice

Krebs on Security

The Chinese company in charge of handing out domain names ending in “ top ” has been given until mid-August 2024 to show that it has put in place systems for managing phishing reports and suspending abusive domains, or else forfeit its license to sell domains. The warning comes amid the release of new findings that.top was the most common suffix in phishing websites over the past year, second only to domains ending in “ com.” Image: Shutterstock.

Phishing 293
article thumbnail

How Outsourcing Cybersecurity Crashed the World’s IT: A Webinar With Columbia University Faculty

Joseph Steinberg

CyberSecurity Expert Witness and Board Member , Joseph Steinberg, will, tomorrow, Wednesday, July 24th, 2024, speak with the public as part of a panel of experts from Columbia University, discussing both the recent CrowdStrike-Microsoft cybersecurity incident, and the incident’s ongoing global impact. On July 19th, 2024, a faulty software update issued by the cybersecurity firm, CrowdStrike, took down over 8.5 million devices running Microsoft Windows, disrupting air travel, hospitals, gov

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2017 ODNI Memo on Kaspersky Labs

Schneier on Security

It’s heavily redacted , but still interesting. Many more ODNI documents here.

251
251
article thumbnail

Cyber Security Public-Private Partnerships Are Taking Off in APAC

Tech Republic Security

Australia is among the APAC governments forging closer ties with the private sector due to the realisation that the public sector can no longer fight the increase in cyber criminals alone.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

US Gov sanctioned key members of the Cyber Army of Russia Reborn hacktivists group

Security Affairs

The US government sanctioned two Russian hacktivists for their cyberattacks targeting critical infrastructure, including breaches of water facilities. The United States sanctioned Russian hacktivists Yuliya Vladimirovna Pankratova and Denis Olegovich Degtyarenko, members of the Russian hacktivist group Cyber Army of Russia Reborn (CARR), for their roles in cyber operations against U.S. critical infrastructure.

DDOS 145
article thumbnail

Bitwarden vs Dashlane (2024): Which Password Manager Is Best?

Tech Republic Security

Bitwarden’s affordability and extensive MFA options give it the slight edge over Dashlane’s uber-polished password management experience. Read more below.

More Trending

article thumbnail

How Russia-Linked Malware Cut Heat to 600 Ukrainian Buildings in Deep Winter

WIRED Threat Level

The code, the first of its kind, was used to sabotage a heating utility in Lviv at the coldest point in the year—what appears to be yet another innovation in Russia’s torment of Ukrainian civilians.

Malware 140
article thumbnail

Chinese Hackers Target Taiwan and US NGO with MgBot Malware

The Hacker News

Organizations in Taiwan and a U.S. non-governmental organization (NGO) based in China have been targeted by a Beijing-affiliated state-sponsored hacking group called Daggerfly using an upgraded set of malware tools. The campaign is a sign that the group "also engages in internal espionage," Symantec's Threat Hunter Team, part of Broadcom, said in a new report published today.

Malware 143
article thumbnail

Hackers abused swap files in e-skimming attacks on Magento sites

Security Affairs

Threat actors abused swap files in compromised Magento websites to hide credit card skimmer and harvest payment information. Security researchers from Sucuri observed threat actors using swap files in compromised Magento websites to conceal a persistent software skimmer and harvest payment information. The attackers used this tactic to maintain persistence and allowing the malware to survive multiple cleanup attempts.

Malware 139
article thumbnail

New ICS Malware 'FrostyGoop' Targeting Critical Infrastructure

The Hacker News

Cybersecurity researchers have discovered what they say is the ninth Industrial Control Systems (ICS)-focused malware that has been used in a disruptive cyber attack targeting an energy company in the Ukrainian city of Lviv earlier this January.

Malware 141
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Google admits it can’t quite quit third-party cookies

Malwarebytes

For more than a year , Google has said it would phase out the third-party tracking cookies that power much of its advertising business online, proposing new ideas that would allegedly preserve user privacy while still providing businesses with steady revenue streams. This week, Google tossed much of that work aside. In an update about Google’s Privacy Sandbox , the tech giant said that due to feedback from authorities and other stakeholders in advertising, it is looking at a new path forwa

article thumbnail

Magento Sites Targeted with Sneaky Credit Card Skimmer via Swap Files

The Hacker News

Threat actors have been observed using swap files in compromised websites to conceal a persistent credit card skimmer and harvest payment information. The sneaky technique, observed by Sucuri on a Magento e-commerce site's checkout page, allowed the malware to survive multiple cleanup attempts, the company said.

Malware 140
article thumbnail

EFF Angry as Google Keeps 3rd-Party Cookies in Chrome

Security Boulevard

Regulatory capture by stealth? Google changes its mind about third-party tracking cookies—we’re stuck with them for the foreseeable. The post EFF Angry as Google Keeps 3rd-Party Cookies in Chrome appeared first on Security Boulevard.

article thumbnail

Ukrainian Institutions Targeted Using HATVIBE and CHERRYSPY Malware

The Hacker News

The Computer Emergency Response Team of Ukraine (CERT-UA) has alerted of a spear-phishing campaign targeting a scientific research institution in the country with malware known as HATVIBE and CHERRYSPY.

Malware 139
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The tap-estry of threats targeting Hamster Kombat players

We Live Security

ESET research reveals how the success of Hamster Kombats has attracted malicious actors trying to abuse interest in the game for monetary gain.

135
135
article thumbnail

CISA Adds Twilio Authy and IE Flaws to Exploited Vulnerabilities List

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities are listed below - CVE-2012-4792 (CVSS score: 9.3) - Microsoft Internet Explorer Use-After-Free Vulnerability CVE-2024-39891 (CVSS score: 5.

Internet 134
article thumbnail

Fake CrowdStrike repair manual pushes new infostealer malware

Bleeping Computer

CrowdStrike is warning that a fake recovery manual to repair Windows devices is installing a new information-stealing malware called Daolpu. [.

Malware 130
article thumbnail

Meta Given Deadline to Address E.U. Concerns Over 'Pay or Consent' Model

The Hacker News

Meta has been given time till September 1, 2024, to respond to concerns raised by the European Commission over its "pay or consent" advertising model or risk-facing enforcement measures, including sanctions.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

10 Ways AI Can Help Organizations Tackle Cyberattacks

Tech Republic Security

Legacy security measures, while offering a baseline level of protection, heavily rely on predefined signatures and a narrow definition of the “abnormal.” They often follow a reactive approach, can be siloed, limiting information sharing, and lack the scalability to handle the terabytes of data generated by today’s complex IT systems. This is where artificial intelligence.

article thumbnail

How to Securely Onboard New Employees Without Sharing Temporary Passwords

The Hacker News

The initial onboarding stage is a crucial step for both employees and employers. However, this process often involves the practice of sharing temporary first-day passwords, which can expose organizations to security risks.

Passwords 129
article thumbnail

Building cyber-resilience: Lessons learned from the CrowdStrike incident

We Live Security

Organizations, including those that weren’t struck by the CrowdStrike incident, should resist the temptation to attribute the IT meltdown to exceptional circumstances

123
123
article thumbnail

DDoS-for-hire site DigitalStress taken down by police, suspected owner arrested

Graham Cluley

It has been revealed that earlier this month a website which offered a DDoS-for-hire service was taken offline by law enforcement, but only after they collected data about its criminal customers. Read more in my article on the Hot for Security blog.

DDOS 119
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Leave the World Behind, or don’t

Pen Test Partners

I watched Leave the World Behind on Netflix recently. I was intrigued as the trailers showed an oil tanker crashing on to a beach. It was implied that it had been hacked and someone had taken control of it. Shipping security is something we know quite a bit about, having been asked to hack a large number of ships by their owners, to help improve their security.

Hacking 116
article thumbnail

British teen arrested in connection with MGM Resorts ransomware attack

Graham Cluley

British police have arrested a 17-year-old boy believed to be linked to a cybercriminal gang that launched devastating ransomware attacks last year on MGM Resorts and other companies. Read more in my article on the Hot for Security blog.

article thumbnail

Wiz Walks Away From $23 Billion Google Bid

Security Boulevard

Cloud security startup Wiz reportedly is rejecting Google's $23 billion acquisition bid, with the CEO saying the Israeli company will now focus on going public and reach the point of having $1 billion in recurring revenue. The post Wiz Walks Away From $23 Billion Google Bid appeared first on Security Boulevard.

article thumbnail

Chinese hackers deploy new Macma macOS backdoor version

Bleeping Computer

The Chinese hacking group tracked as 'Evasive Panda' was spotted using new versions of the Macma backdoor and the Nightdoor Windows malware.

Malware 107
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Cybersecurity Mandates Coming for R&D Security in Higher Ed, Research

SecureWorld News

In a recent memo, the U.S. Office of Science and Technology Policy (OSTP) announced new federal regulations mandating that certain covered institutions, specifically those involved in research and development (R&D) and higher education, implement robust cybersecurity programs to safeguard their research efforts. The directive underscores the growing importance of securing sensitive R&D data against cyber threats and aims to strengthen the overall security posture of institutions engaged

article thumbnail

Windows 10 KB5040525 fixes WDAC issues causing app failures, memory leak

Bleeping Computer

Microsoft has released the July 2024 preview update for Windows 10, version 22H2, with fixes for Windows Defender Application Control (WDAC) issues causing app crashes and system memory exhaustion. [.

105
105
article thumbnail

Docker Users Beware: CVE-2024-41110 (CVSS 10) Could Lead to System Takeover

Penetration Testing

Docker has issued a security advisory for a critical vulnerability affecting certain versions of Docker Engine. This vulnerability, identified as CVE-2024-41110, has a CVSS score of 10, indicating a critical severity. The issue allows... The post Docker Users Beware: CVE-2024-41110 (CVSS 10) Could Lead to System Takeover appeared first on Cybersecurity News.

article thumbnail

BreachForums v1 database leak is an OPSEC test for hackers

Bleeping Computer

The entire database for the notorious BreachForums v1 hacking forum was released on Telegram Tuesday night, exposing a treasure trove of data, including members' information, private messages, cryptocurrency addresses, and every post on the forum. [.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.