Sat.Jul 09, 2022 - Fri.Jul 15, 2022

article thumbnail

Security Vulnerabilities in Honda’s Keyless Entry System

Schneier on Security

Honda vehicles from 2021 to 2022 are vulnerable to this attack : On Thursday, a security researcher who goes by Kevin2600 published a technical report and videos on a vulnerability that he claims allows anyone armed with a simple hardware device to steal the code to unlock Honda vehicles. Kevin2600, who works for cybersecurity firm Star-V Lab, dubbed the attack RollingPWN. […].

Software 335
article thumbnail

Experian, You Have Some Explaining to Do

Krebs on Security

Twice in the past month KrebsOnSecurity has heard from readers who’ve had their accounts at big-three credit bureau Experian hacked and updated with a new email address that wasn’t theirs. In both cases the readers used password managers to select strong, unique passwords for their Experian accounts. Research suggests identity thieves were able to hijack the accounts simply by signing up for new accounts at Experian using the victim’s personal information and a different email

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Advanced tools, tactics required to defend latest attack variant — ‘DeepSea phishing’

The Last Watchdog

Phishing itself is not a new or a particularly complicated threat. But the emergence of advanced phishing techniques – “DeepSea Phishing” – poses an entirely new challenge for enterprises. Related: Deploying human sensors. Phishing comes with a simple premise – lure someone to interact with a malicious link, file, or credentials-input, disguised as a legitimate email or website.

Phishing 277
article thumbnail

Will iPhone’s New “Lockdown Mode” Create Dangerous Overconfidence In Apple’s CyberSecurity Capabilities?

Joseph Steinberg

Apple last week announced new security features specifically intended to offer “specialized additional protection to users who may be at risk of highly targeted cyberattacks from private companies developing state-sponsored mercenary spyware.”. In its announcement, the maker of iPhones, iPads, and Macs stated that its new “Lockdown Mode” represents a “groundbreaking security capability;” Lockdown Mode, which is available to users of a range of devices running Apple’s latest OS beta releases, is

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

San Francisco Police Want Real-Time Access to Private Surveillance Cameras

Schneier on Security

Surely no one could have predicted this : The new proposal—championed by Mayor London Breed after November’s wild weekend of orchestrated burglaries and theft in the San Francisco Bay Area—would authorize the police department to use non-city-owned security cameras and camera networks to live monitor “significant events with public safety concerns” and ongoing felony or misdemeanor violations.

article thumbnail

Microsoft Patch Tuesday, July 2022 Edition

Krebs on Security

Microsoft today released updates to fix at least 86 security vulnerabilities in its Windows operating systems and other software, including a weakness in all supported versions of Windows that Microsoft warns is actively being exploited. The software giant also has made a controversial decision to put the brakes on a plan to block macros in Office documents downloaded from the Internet.

Internet 242

More Trending

article thumbnail

Q&A: Here’s why VPNs are likely to remain a valuable DIY security tool for consumers, SMBs

The Last Watchdog

It is astounding that billions of online accounts have been breached over the past 18 years and that US consumer accounts are by far the most compromised. Related: VPNs vs ZTNA. Now comes hard metrics quantifying the scope of this phenomenon. It’s in findings of a deep dive data analytics study led by Surfshark , a supplier of VPN services aimed at the consumer and SMB markets.

VPN 229
article thumbnail

State-sponsored cyberespionage campaigns continue targeting journalists and media

Tech Republic Security

Journalists have information that makes them particularly interesting for state-sponsored cyberespionage threat actors. Learn more about these threats now. The post State-sponsored cyberespionage campaigns continue targeting journalists and media appeared first on TechRepublic.

Media 203
article thumbnail

New Highly-Evasive Linux Malware Infects All Running Processes

eSecurity Planet

Intezer Labs security researchers have identified a sophisticated new malware that targets Linux devices. Dubbed OrBit , the malware can gain persistence quickly, evade detection and hide its presence in network activity by manipulating logs. The module hooks functions called in shared libraries, which is pretty common for malware, but it also implements “advanced evasion techniques” and “remote capabilities over SSH.”.

Malware 145
article thumbnail

Weekly Update 304

Troy Hunt

It's very much a last-minute agenda this week as I catch up on the inevitable post-travel backlog and pretty much just pick stuff from my tweet timeline over the week 😊 But hey, there's some good stuff in there and I still managed to knock out almost an hour worth of content! References La Poste Mobile got themselves ransom'd and their data dumped (and they're still offline) Mangatoon are very clearly covering up their breach (which is now hard to do given it's i

Mobile 218
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Fortinet addressed multiple vulnerabilities in several products

Security Affairs

Fortinet released security patches to address multiple High-Severity vulnerabilities in several products of the vendor. Fortinet addressed multiple vulnerabilities in several products of the vendor. Impacted products are FortiADC, FortiAnalyzer, FortiManager, FortiOS, FortiProxy, FortiClient, FortiDeceptor, FortiEDR, FortiNAC, FortiSwitch, FortiRecorder, and FortiVoiceEnterprise.

article thumbnail

Secure remote help can be powerful but may not be cheap

Tech Republic Security

Use the new Windows Remote Help app to support remote and hybrid employees from Microsoft Endpoint Manager securely without a VPN. The post Secure remote help can be powerful but may not be cheap appeared first on TechRepublic.

VPN 190
article thumbnail

How One Company Survived a Ransomware Attack Without Paying the Ransom

eSecurity Planet

The first signs of the ransomware attack at data storage vendor Spectra Logic were reports from a number of IT staffers about little things going wrong at the beginning of the day. Matters steadily worsened within a very short time and signs of a breach became apparent. Screens then started to display a ransom demand, which said files had been encrypted by the NetWalker ransomware virus.

article thumbnail

DHS Review Board Deems Log4j an 'Endemic' Cyber Threat

Dark Reading

Vulnerability will remain a "significant" threat for years to come and highlighted the need for more public and private sector support for open source software ecosystem, Cyber Safety Review Board says.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Collaboration and knowledge sharing key to progress in cybersecurity

We Live Security

In a world of ever-evolving cyberthreats, collaboration and knowledge exchange are vital for keeping an edge on attackers. The post Collaboration and knowledge sharing key to progress in cybersecurity appeared first on WeLiveSecurity.

article thumbnail

Nearly half of enterprise endpoint devices present significant security risks

Tech Republic Security

Organizations are struggling to manage devices and stay ahead of vulnerabilities, patches and attacks, according to a new report from Adaptiva and the Ponemon Institute. The post Nearly half of enterprise endpoint devices present significant security risks appeared first on TechRepublic.

Risk 174
article thumbnail

10,000 organisations targeted by phishing attack that bypasses multi-factor authentication

The State of Security

Microsoft has shared details of a widespread phishing campaign that not only attempted to steal the passwords of targeted organisations, but was also capable of circumventing multi-factor authentication (MFA) defences. Read more in my article on the Tripwire State of Security blog.

article thumbnail

Survey Surfaces Raft of Industrial IoT Security Challenges

Security Boulevard

A survey of 800 senior IT managers, senior IT security managers and project managers responsible for industrial internet-of-things (IIoT)/operational technology (OT) found 94% reported their organization experienced a security incident in the last 12 months. The survey, conducted by Barracuda Networks, also found 87% of organizations that experienced an incident were impacted for more than.

IoT 141
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Three UEFI Firmware flaws found in tens of Lenovo Notebook models

Security Affairs

IT giant Lenovo released security fixes to address three vulnerabilities that impact the UEFI firmware shipped with over 70 product models. The multinational technology company Lenovo released security fixes to address three vulnerabilities that reside in the UEFI firmware shipped with over 70 product models, including several ThinkBook models. A remote attacker can trigger these flaws to execute arbitrary code on the vulnerable systems in the early stages of the boot avoiding the detection of s

Firmware 141
article thumbnail

Brave uses Goggle to show only cybersecurity websites

Tech Republic Security

The independent search engine introduced its new feature that filters results. The post Brave uses Goggle to show only cybersecurity websites appeared first on TechRepublic.

article thumbnail

Password recovery tool infects industrial systems with Sality malware

Bleeping Computer

A threat actor is infecting industrial control systems (ICS) to create a botnet through password "cracking" software for programmable logic controllers (PLCs). [.].

Passwords 144
article thumbnail

Experian FAILs yet Again — Hackers can Change Your Email Address

Security Boulevard

Credit reporting agency Experian has a nasty vulnerability. Why do we put up with this? The post Experian FAILs yet Again — Hackers can Change Your Email Address appeared first on Security Boulevard.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Holy Ghost ransomware operation is linked to North Korea

Security Affairs

Microsoft researchers linked the Holy Ghost ransomware (H0lyGh0st) operation to North Korea-linked threat actors. The Microsoft Threat Intelligence Center (MSTIC) researchers linked the activity of the Holy Ghost ransomware (H0lyGh0st) operation to a North Korea-linked group they tracked as DEV-0530. The Holy Ghost ransomware gang has been active since June 2021 and it conducted ransomware attacks against small businesses in multiple countries.

article thumbnail

Critical infrastructure IIoT/OT security projects suffer high rates of failure

Tech Republic Security

Barracuda found that 93% of organizations in the areas of IIoT/OT have experienced a failed security project. The post Critical infrastructure IIoT/OT security projects suffer high rates of failure appeared first on TechRepublic.

Internet 158
article thumbnail

WhatsApp warns users: Fake versions of WhatsApp are trying to steal your personal info

Malwarebytes

WhatsApp boss Will Cathcart is warning users of the popular messaging app to be on their guard after the WhatsApp Security Team discovered bogus apps packing a hidden punch in the form of malware. Outside the safety of the walled garden. App stores do whatever they can to try and prevent bogus programs making it onto the storefront. While the majority of apps on legitimate stores are likely safe, rogues do get through.

Mobile 136
article thumbnail

Mangatoon data breach exposes data from 23 million accounts

Bleeping Computer

Manga comic reading app Mangatoon has suffered a data breach that exposed the account information of 23 million users after a hacker stole it from an Elasticsearch database. [.].

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Large-scale AiTM phishing campaign targeted +10,000 orgs since 2021?

Security Affairs

A large-scale phishing campaign used adversary-in-the-middle (AiTM) phishing sites to hit more than 10,000 organizations. Microsoft observed a large-scale phishing campaign that used adversary-in-the-middle (AiTM) phishing sites to steal passwords, hijack a user’s sign-in session, and bypass the authentication process even when the victim has enabled the MFA.

Phishing 144
article thumbnail

Apple to tackle the cybersurveillance industry with new Lockdown mode

Tech Republic Security

The optional feature will be launched next fall to protect users who are particularly at risk of being targeted by advanced cyberattacks. The post Apple to tackle the cybersurveillance industry with new Lockdown mode appeared first on TechRepublic.

Risk 158
article thumbnail

Celebrating Emoji Day in CyberSecurity!

Thales Cloud Protection & Licensing

Celebrating Emoji Day in CyberSecurity! divya. Thu, 07/14/2022 - 06:57. It's that day of the year again - the time? when we celebrate ?? Emoji Day on ?? 17 July. You might be wondering ??, what is Emoji Day, and what does it have to do with cybersecurity??? And you might think ?? why should security ?? professionals even care? Well, emojis are everywhere and used in all types of digital communication ???

article thumbnail

Hackers targeting journalists across the World

CyberSecurity Insiders

All these days we have seen hackers targeting companies, individuals, politicians and celebrity stalwarts. But now, security research conducted by Proofpoint says that APT groups are now after journalists across the world and are interested in gaining access to classical information, n sources, manipulate their news drafts and postings and use their credentials to get into the networks of media outlets.

Media 130
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.