Sat.Feb 18, 2023 - Fri.Feb 24, 2023

article thumbnail

Cyberwar Lessons from the War in Ukraine

Schneier on Security

The Aspen Institute has published a good analysis of the successes, failures, and absences of cyberattacks as part of the current war in Ukraine: “ The Cyber Defense Assistance Imperative ­ Lessons from Ukraine.” Its conclusion: Cyber defense assistance in Ukraine is working. The Ukrainian government and Ukrainian critical infrastructure organizations have better defended themselves and achieved higher levels of resiliency due to the efforts of CDAC and many others.

article thumbnail

Down the Cloudflare / Stripe / OWASP Rabbit Hole: A Tale of 6 Rabbits Deep ? ? ? ? ? ?

Troy Hunt

I found myself going down a previously unexplored rabbit hole recently, or more specifically, what I thought was "a" rabbit hole but in actual fact was an ever-expanding series of them that led me to what I refer to in the title of this post as "6 rabbits deep" It's a tale of firewalls, APIs and sifting through layers and layers of different services to sniff out the root cause of something that seemed very benign, but actually turned out to be highly impactful.

Firewall 332
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Who’s Behind the Botnet-Based Service BHProxies?

Krebs on Security

A security firm has discovered that a six-year-old crafty botnet known as Mylobot appears to be powering a residential proxy service called BHProxies , which offers paying customers the ability to route their web traffic anonymously through compromised computers. Here’s a closer look at Mylobot, and a deep dive into who may be responsible for operating the BHProxies service.

article thumbnail

IBM: Most ransomware blocked last year, but cyberattacks are moving faster

Tech Republic Security

A new study from IBM Security suggests cyberattackers are taking side routes that are less visible, and they are getting much faster at infiltrating perimeters. The post IBM: Most ransomware blocked last year, but cyberattacks are moving faster appeared first on TechRepublic.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Putting Undetectable Backdoors in Machine Learning Models

Schneier on Security

This is really interesting research from a few months ago: Abstract: Given the computational cost and technical expertise required to train machine learning models, users may delegate the task of learning to a service provider. Delegation of learning has clear benefits, and at the same time raises serious concerns of trust. This work studies possible abuses of power by untrusted learners.We show how a malicious learner can plant an undetectable backdoor into a classifier.

344
344
article thumbnail

‘See No Evil’ — Mozilla SLAMS Google’s App Privacy Labels

Security Boulevard

Google doesn’t want you to know what your Android apps do with your data. That seems to be the conclusion from a Mozilla study into the Play Store. The post ‘See No Evil’ — Mozilla SLAMS Google’s App Privacy Labels appeared first on Security Boulevard.

More Trending

article thumbnail

Report: Stress will drive a quarter of cyber defenders out the door

Tech Republic Security

There are too few cybersecurity experts to fill jobs, but a new study sees the crunch increasing through 2025 as cybersecurity experts head for the hills. The post Report: Stress will drive a quarter of cyber defenders out the door appeared first on TechRepublic.

article thumbnail

The Insecurity of Photo Cropping

Schneier on Security

The Intercept has a long article on the insecurity of photo cropping: One of the hazards lies in the fact that, for some of the programs, downstream crop reversals are possible for viewers or readers of the document, not just the file’s creators or editors. Official instruction manuals, help pages, and promotional materials may mention that cropping is reversible, but this documentation at times fails to note that these operations are reversible by any viewers of a given image or document.

225
225
article thumbnail

How to Create a GDPR Data Protection Policy

Security Boulevard

In this blog, we will discuss what GDPR compliance entails and provide tips on how to create an effective GDPR data protection policy. The post How to Create a GDPR Data Protection Policy appeared first on Scytale. The post How to Create a GDPR Data Protection Policy appeared first on Security Boulevard.

Risk 145
article thumbnail

Brave browser to block “open in app” prompts, pool-party attacks

Bleeping Computer

Brave Software, the developer of the privacy-focused web browser, has announced some plants for the upcoming version 1.49 that will block everyday browsing annoyances like "open in app" prompts and add better protections against pool-party attacks, [.

Software 144
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Digital forensics and incident response: The most common DFIR incidents

Tech Republic Security

A new State of Enterprise DFIR survey covers findings related to automation, hiring, data and regulations and more. The post Digital forensics and incident response: The most common DFIR incidents appeared first on TechRepublic.

article thumbnail

Fines as a Security System

Schneier on Security

Tile has an interesting security solution to make its tracking tags harder to use for stalking: The Anti-Theft Mode feature will make the devices invisible to Scan and Secure, the company’s in-app feature that lets you know if any nearby Tiles are following you. But to activate the new Anti-Theft Mode, the Tile owner will have to verify their real identity with a government-issued ID, submit a biometric scan that helps root out fake IDs, agree to let Tile share their information with law e

article thumbnail

Innovation at the Expense of Cybersecurity? No More!

Security Boulevard

Earlier this month, Jen Easterly and Eric Goldstein of the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security signaled a major shift in the federal government’s approach to cybersecurity risk and responsibility. In their Foreign Affairs article Stop Passing the Buck on Cybersecurity, Easterly and Goldstein make a strong case for.

article thumbnail

Fake ChatGPT apps spread Windows and Android malware

Graham Cluley

Malicious hackers are taking advantage of people searching the internet for free access to ChatGPT in order to direct them to malware and phishing sites. Read more in my article on the Hot for Security blog.

Malware 142
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to expand your search sources

Tech Republic Security

Explore search services beyond Google and Bing for a wider range of results, customization and privacy options. The post How to expand your search sources appeared first on TechRepublic.

article thumbnail

Vulnerability Reward Program: 2022 Year in Review

Google Security

Posted by Sarah Jacobus, Vulnerability Rewards Team It has been another incredible year for the Vulnerability Reward Programs (VRPs) at Google! Working with security researchers throughout 2022, we have been able to identify and fix over 2,900 security issues and continue to make our products more secure for our users around the world. We are thrilled to see significant year over year growth for our VRPs, and have had yet another record breaking year for our programs!

article thumbnail

Surprise! US DoD Server Had no Password — 3TB of Sensitive Data Leaked

Security Boulevard

Sensitive military data found on unprotected Microsoft Azure server. Defense Department email store left insecure for at least 11 days. The post Surprise! US DoD Server Had no Password — 3TB of Sensitive Data Leaked appeared first on Security Boulevard.

Passwords 144
article thumbnail

Dish Network goes offline after likely cyberattack, employees cut off

Bleeping Computer

American TV giant and satellite broadcast provider, Dish Network has mysteriously gone offline with its websites and apps ceasing to function over the past 24 hours. [.

140
140
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

DLL sideloading and CVE attacks show diversity of threat landscape

Tech Republic Security

Studies from Bitdefender and Arctic Wolf show that new tactics are using twists on concealment in social media and old vulnerabilities in third-party software. The post DLL sideloading and CVE attacks show diversity of threat landscape appeared first on TechRepublic.

Media 157
article thumbnail

Microsoft ChatGPT has the potential to replace white-collar jobs says IBM Chief

CyberSecurity Insiders

IBM Chief felt ChatGPT, an OpenAI developed a platform of Microsoft, has the potential to replace white-collar jobs such as insurance consultants, lawyers, accountants, computer programmers and admin roles. Arvind Krishna, the lead of the technology at IBM, predicts that some sort of jobs will replace by AI models and so job steal is predictably possible.

Insurance 137
article thumbnail

GoDaddy Hosting Hacked — for FOURTH Time in 4 Years

Security Boulevard

GoDaddy’s web hosting service breached yet again. This time, the perps were redirecting legit websites to malware. The post GoDaddy Hosting Hacked — for FOURTH Time in 4 Years appeared first on Security Boulevard.

Hacking 143
article thumbnail

Dish Network goes down in a mysterious outage, employees cut off

Bleeping Computer

American TV giant and satellite broadcast provider, Dish Network has mysteriously gone offline with its websites and apps ceasing to function over the past 24 hours. [.

139
139
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Investigating the PlugX Trojan Disguised as a Legitimate Windows Debugger Tool

Trend Micro

Trend Micro’s Managed Extended Detection and Response (MxDR) team discovered that a file called x32dbg.exe was used to sideload a malicious DLL we identified as a variant of PlugX.

Malware 131
article thumbnail

As Twitter forces users to remove text message 2FA, it’s in danger of decreasing security

Graham Cluley

Many Twitter users have been presented with a message telling them that SMS-based two-factor authentication (2FA) will be removed next month. According to Twitter, only subscribers to its premium Twitter Blue service will be able to use text message-based 2FA to protect their accounts. Is that such a good idea?

article thumbnail

Strategic Threat Intelligence: The Definitive Guide

Security Boulevard

Modern technology has created a world where threat actors are continuously adapting new tools and techniques with the main goal of stealing data from companies. In today’s digital age, traditional defensive security measures are no longer effective at protecting business assets appropriately. Therefore, businesses must be willing to evolve and adapt their cyber strategies to […] The post Strategic Threat Intelligence: The Definitive Guide appeared first on Flare | Cyber Threat Intel |

article thumbnail

GoDaddy Discloses Data Breach Spanning Multiple Years

Heimadal Security

GoDaddy, a major provider of web hosting services, claims that a multi-year attack on its cPanel shared hosting environment resulted in a breach where unidentified attackers stole source code and installed malware on its servers. While the attackers had access to the company’s network for a number of years, GoDaddy only learned about the security […] The post GoDaddy Discloses Data Breach Spanning Multiple Years appeared first on Heimdal Security Blog.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Microsoft tells Exchange admins to revert previously recommended antivirus exclusions

CSO Magazine

Microsoft is advising Exchange Server administrators to remove some of the endpoint antivirus exclusions that the company's own documentation recommended in the past. The rules are no longer needed for server stability and their presence could prevent the detection of backdoors deployed by attackers. "Times have changed, and so has the cybersecurity landscape," the Exchange Server team said in a blog post.

Antivirus 127
article thumbnail

WinorDLL64: A backdoor from the vast Lazarus arsenal?

We Live Security

The targeted region, and overlap in behavior and code, suggest the tool is used by the infamous North Korea-aligned APT group The post WinorDLL64: A backdoor from the vast Lazarus arsenal?

126
126
article thumbnail

Debunking Three Common Threat Modeling Myths

Security Boulevard

The benefits of threat modeling are significant. Not only does it provide a systematic process for evaluating potential threats to an organization’s system, but it also creates a framework for informed decision-making, ensuring the best use of limited resources. Despite threat modeling existing as a proven way to mitigate risk, in 2021, we saw a. The post Debunking Three Common Threat Modeling Myths appeared first on Security Boulevard.

Risk 126
article thumbnail

HardBit ransomware demands ransom based on insurance cover

CyberSecurity Insiders

All these days we have read about ransomware spreading groups stealing data and then threatening to release it online, if the victim fails to pay heed to their demands. But now a new file encrypting malware variant has emerged onto the block that demands ransom, based on the insurance cover. HardBit 2.0 ransomware does so during negotiations and tries to find the exact amount to be covered with the cyber insurance and then demands ransom.

Insurance 124
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.