Sat.Dec 21, 2019 - Fri.Dec 27, 2019

article thumbnail

Chinese Hackers Bypassing Two-Factor Authentication

Schneier on Security

Interesting story of how a Chinese state-sponsored hacking group is bypassing the RSA SecurID two-factor authentication system. How they did it remains unclear; although, the Fox-IT team has their theory. They said APT20 stole an RSA SecurID software token from a hacked system, which the Chinese actor then used on its computers to generate valid one-time codes and bypass 2FA at will.

article thumbnail

How to install and use Firejail on Linux

Tech Republic Security

Firejail allows you to easily sandbox Linux applications. Find out how to add this extra layer of security.

193
193
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware at IT Services Provider Synoptek

Krebs on Security

Synoptek , a California business that provides cloud hosting and IT management services to more than a thousand customer nationwide, suffered a ransomware attack this week that has disrupted operations for many of its clients, according to sources. The company has reportedly paid a ransom demand in a bid to restore operations as quickly as possible.

article thumbnail

Data Breach Compromises Payment Card Info At Wawa Stores

Adam Levin

Convenience store and gas station chain Wawa informed customers of a data breach that compromised payment card information at most of its 842 locations. In an announcement released December 19, Wawa CEO Chris Gheysens. stated that the company’s information security team had discovered malware on their payment processing servers about a week earlier.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

ToTok Is an Emirati Spying Tool

Schneier on Security

The smartphone messaging app ToTok is actually an Emirati spying tool : But the service, ToTok, is actually a spying tool, according to American officials familiar with a classified intelligence assessment and a New York Times investigation into the app and its developers. It is used by the government of the United Arab Emirates to try to track every conversation, movement, relationship, appointment, sound and image of those who install it on their phones.

article thumbnail

When Is Data "Public"? (And 2.5M Public Factual Records in HIBP)

Troy Hunt

When is data "public"? And what does "public" even mean? Does it mean it's merely visible to the public? Or does it mean the public can do anything they like with it? This discussion comes up time and time again as it did with the huge leak of PDL data only last month. For the most part, the impacted data in this incident came from LinkedIn, a service where by design we (including myself) publish personal information about ourselves for public consumption.

More Trending

article thumbnail

Comparing Offensive Security Tooling and Gun Control

Daniel Miessler

A debate recently flared up on Twitter around creating and sharing high-quality Offensive Security Tools, such as Empire. Richard Bejtlich came out against, saying that OST tools were doing more harm than good. “We believe that Powershell and Empire framework will remain a major threat vector employed by APTs, malware authors, and Red Teams.” SO WHY ARE YOU UPDATING IT?

article thumbnail

Top cybersecurity Predictions for 2020

Security Affairs

The 2020 Cybersecurity Landscape – Below Pierluigi Paganini’s cybersecurity predictions for the next twelve months. Here we are again for the annual prediction of the events that I believe will impact the cybersecurity landscape in the next year. Let’s try to imagine what threats and bad actors will influence the cyber arena in the next 12 months. 1) Targeted ransomware attacks on the rise.

article thumbnail

Weekly Update 170

Troy Hunt

Monday: 40C and lapping up the Gold Coast sunshine. Wednesday: -8C and lapping up. Juicy IPA ! I'm back in Oslo and catching up with the locals including running a roundtable discussion for CSOs at Microsoft, visiting the Norwegian National Cyber Security Centre ( recently onboarded to HIBP ) and chatting with Forbrukerrådet, the Norwegian Consumer Counsel.

Risk 137
article thumbnail

How to protect specific folders and files in Windows

Tech Republic Security

Learn how to hide or encrypt specific files in Windows in order to better protect them.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Unsupervised Learning: No. 208 (Member Edition)

Daniel Miessler

This is UL Member Content Subscribe Already a member? Login No related posts.

article thumbnail

The Decade Big-Money Email Scams Took Over

WIRED Threat Level

In the last few years, the "Nigerian prince" scams have gotten a major upgrade.

Scams 98
article thumbnail

New Mozi P2P Botnet targets Netgear, D-Link, Huawei routers

Security Affairs

A new Mozi P2P botnet is actively targeting Netgear, D-Link, and Huawei routers by probing for weak Telnet passwords to compromise them. Security experts from 360 Netlab spotted a new Mozi P2P botnet that is actively targeting Netgear, D-Link, and Huawei routers by probing for weak Telnet passwords to compromise them. According to the researchers, in the last months, the botnet was mainly involved in DDoS attacks, experts also noticed that the sample borrows part of code from the Gafgyt malware.

DDOS 98
article thumbnail

Security teams have a challenging and ever-changing role. Here's how a SOC can keep up

Tech Republic Security

Security teams should coordinate and operate by standard practices to ensure their efforts yield the maximum results. Learn some tips from an industry insider on how to make it happen.

109
109
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Biggest Malware Threats of 2019

Threatpost

2019 was another banner year for bots, trojans, RATS and ransomware. Let’s take a look back.

Malware 83
article thumbnail

The Worst Hacks of the Decade

WIRED Threat Level

It's been a rough 10 years in cybersecurity—and it's only getting worse.

Hacking 98
article thumbnail

RuNet – Russia successfully concluded tests on its Internet infrastructure

Security Affairs

Russia successfully disconnected from the internet. Russia’s government announced that it has successfully concluded a series of tests for its RuNet intranet aimed at country disconnection from the Internet. The Russian Government has announced on Monday that it has successfully concluded the test on its RuNet intranet and the complete disconnection of the country from the Internet. “The results of the exercises showed that, in general, both authorities and telecom operators are read

article thumbnail

How to enable 2FA for Docker Hub

Tech Republic Security

If you're concerned about the security of your code within Docker Hub, you might want to enable two-factor authentication.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

SIM Swapping Attacks: What They Are & How to Stop Them

Dark Reading

Fraudsters with social engineering skills are hijacking cell phone SIM cards to access victims' bitcoin and social media accounts

article thumbnail

Facebook Security Debacles: 2019 Year in Review

Threatpost

2019 was a tumultuous year for Facebook as it continued to grapple with privacy fallout after Cambridge Analytica, as well as dealing with a slew of security challenges.

Media 80
article thumbnail

CVE-2019-19781 Citrix flaw exposes 80,000 companies at risk

Security Affairs

Critical CVE-2019-19781 flaw in Citrix NetScaler ADC and Citrix NetScaler Gateway could be exploited to access company networks, 80,000 companies at risk worldwide. A critical vulnerability in Citrix Application Delivery Controller (NetScaler ADC) and Citrix Gateway (NetScaler Gateway), tracked as CVE-2019-19781 , could be exploited by attackers to access company networks.

Risk 98
article thumbnail

How to enable 2FA for Docker Hub

Tech Republic Security

If you're concerned about the security of your code within Docker Hub, you might want to enable two-factor authentication.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Ransomware Detection Using Machine Learning 

Spinone

A lone administrator peers at a security console, looking at screens that may best be described as looking at “the Matrix” He tries desperately to find any anomalies that might indicate the greatest challenge to your data – ransomware. In today’s world of incomprehensible amounts of data and network traffic both on-premises and in the cloud, it is no longer feasible for a single administrator to catch ransomware attacks by legacy means, especially with only manual efforts

article thumbnail

Uninstall ToTok, an Alleged Emirati Spy App, From Your Phone Now

WIRED Threat Level

A messaging app called ToTok had scores of positive reviews, particularly from users in the UAE. US intelligent officials say it may be spying for that government instead. .

article thumbnail

A flaw in Twitter App for Android could have been exploited to take over the account

Security Affairs

A flaw in the Twitter app for Android could have been exploited by attackers to obtain sensitive information or take over an account. Twitter has recently addressed a security vulnerability that affected the Android version of the app, it could have been exploited by hackers to access sensitive information of the users (direct messages, protected tweets and location data) or take over their accounts.

article thumbnail

How to install and use Firejail on Linux

Tech Republic Security

Firejail allows you to easily sandbox Linux applications. Find out how to add this extra layer of security.

78
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

India’s Digital Future Is Bright

Thales Cloud Protection & Licensing

Digital transformation is changing the way we live and work, both in India and around the globe. Companies are fundamentally reshaping their businesses and taking advantage of digital technologies like cloud, mobile, social media, and the Internet of Things to transform the experience their customers receive, create innovative new business models, and find ways to realize new efficiencies and reduce their operating costs.

article thumbnail

Facebook Finally Fixes Its Two-Factor Mess

WIRED Threat Level

A Wawa breach, Russian spies, and more of the week's top security news.

77
article thumbnail

More than 100 Chinese nationals arrested in Nepal over suspected cyber scam

Security Affairs

Nepal police arrested more than 100 Chinese nationals over a suspected cyber scam, this is the largest-ever operation involving foreigners. Nepal authorities have arrested more than 100 Chinese nationals that were in the country on tourist visas, they are suspected to be involved in a cyber scam. The Nepal police conducted a coordinated operation that allowed the arrests of the suspects, eight of which are women.

Scams 97
article thumbnail

Top 10 IoT Disasters of 2019

Threatpost

From more widescale, powerful distributed denial of service (DDoS) attacks, to privacy issues in children's connected toys, here are the top IoT disasters in 2019.

IoT 72
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!