Sat.Oct 16, 2021 - Fri.Oct 22, 2021

article thumbnail

Problems with Multifactor Authentication

Schneier on Security

Roger Grimes on why multifactor authentication isn’t a panacea : The first time I heard of this issue was from a Midwest CEO. His organization had been hit by ransomware to the tune of $10M. Operationally, they were still recovering nearly a year later. And, embarrassingly, it was his most trusted VP who let the attackers in. It turns out that the VP had approved over 10 different push-based messages for logins that he was not involved in.

article thumbnail

Pwned - The Collected Blog Posts of Troy Hunt (Preview)

Troy Hunt

We choose this photo for the cover because this was when it all started. 18-year old Troy, having just discovered the web in early 1995 and chomping at the bit to do something with it. The full tale of what I first did (and how disastrous it ultimately became), is up front early in the book so I won't relay it here, but it's quite the story.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Gartner analyst: 12 technologies to accelerate growth, engineer trust and sculpt change in 2022

Tech Republic Security

CIOs must prioritize the same business imperatives and find the IT force multipliers to enable growth and innovation, according to a Gartner analyst during Gartner's IT Symposium.

article thumbnail

US Government warns of BlackMatter ransomware attacks against critical infrastructure

Graham Cluley

The US Government has issued an alert to organisations about the threat posed by the BlackMatter ransomware group. Read more in my article on the Tripwire State of Security blog.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Nation-State Attacker of Telecommunications Networks

Schneier on Security

Someone has been hacking telecommunications networks around the world: LightBasin (aka UNC1945) is an activity cluster that has been consistently targeting the telecommunications sector at a global scale since at least 2016, leveraging custom tools and an in-depth knowledge of telecommunications network architectures. Recent findings highlight this cluster’s extensive knowledge of telecommunications protocols, including the emulation of these protocols to facilitate command and control (C2

article thumbnail

Zuckerberg Accused Personally in Cambridge Analytica Next Shoe

Security Boulevard

Mark Zuckerberg has been added as a defendant to D.C.’s Cambridge Analytica privacy complaint—this time, it’s personal. The post Zuckerberg Accused Personally in Cambridge Analytica Next Shoe appeared first on Security Boulevard.

More Trending

article thumbnail

What is Magecart? How this hacker group steals payment card data

CSO Magazine

Magecart definition. Magecart is a consortium of malicious hacker groups who target online shopping cart systems, usually the Magento system, to steal customer payment card information. This is known as a supply chain attack. The idea behind these attacks is to compromise a third-party piece of software from a VAR or systems integrator or infect an industrial process unbeknownst to IT. [ How much does a data breach cost?

CSO 145
article thumbnail

The Missouri Governor Doesn’t Understand Responsible Disclosure

Schneier on Security

The Missouri governor wants to prosecute the reporter who discovered a security vulnerability in a state’s website, and then reported it to the state. The newspaper agreed to hold off publishing any story while the department fixed the problem and protected the private information of teachers around the state. […]. According to the Post-Dispatch, one of its reporters discovered the flaw in a web application allowing the public to search teacher certifications and credentials.

Education 319
article thumbnail

“Killware”: Is it just as bad as it sounds?

Malwarebytes

On October 12, after interviewing US Secretary of Homeland Security Alejandro Mayorkas, USA TODAY’s editorial board warned its readers about a dangerous new form of cyberattack under this eye-catching headline: “ The next big cyberthreat isn’t ransomware. It’s killware. And it’s just as bad as it sounds.”. But while “killware” sounds scary, the term itself is unhelpful when describing the many types of cyberattacks that, like USA TODAY wrote, “can literally end lives,” and that

article thumbnail

How to proactively detect and prevent ransomware attacks

Tech Republic Security

Two out of three organizations surveyed by ThycoticCentrify were hit by a ransomware attack over the past 12 months, and more than 80% reportedly opted to pay the ransom.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Experts hacked a fully patched iOS 15 running on iPhone 13 at China’s Tianfu Cup hacking contest

Security Affairs

White hat hackers earned $1.88 million at the Tianfu Cup hacking contest by finding vulnerabilities in popular software. The Tianfu Cup is the most important hacking contest held in China, this year white hat hackers earned $1.88 Million on a total bonus of up to $1.5 Million by demonstrating vulnerabilities in popular software. The edition of this year took place on October 16 and 17 in the city of Chengdu, participants had three attempts of 5 minutes to demonstrate their exploits.

Hacking 145
article thumbnail

Using Machine Learning to Guess PINs from Video

Schneier on Security

Researchers trained a machine-learning system on videos of people typing their PINs into ATMs: By using three tries, which is typically the maximum allowed number of attempts before the card is withheld, the researchers reconstructed the correct sequence for 5-digit PINs 30% of the time, and reached 41% for 4-digit PINs. This works even if the person is covering the pad with their hands.

313
313
article thumbnail

A bug is about to confuse a lot of computers by turning back time 20 years

Malwarebytes

For those of you that remember the fuss about the Y2K bug , this story may sound familiar. The Cybersecurity & Infrastructure Security Agency (CISA) has issued a warning to Critical Infrastructure (CI) owners and operators, and other users who get the time from GPS, about a GPS Daemon (GPSD) bug in GPSD versions 3.20 through 3.22. Y2K. If you don’t remember the Y2K bug, let me remind you quickly.

article thumbnail

Microsoft bought CloudKnox because hybrid multicloud identity is complicated

Tech Republic Security

Managing passwords and privileged access is bad enough for people—but that's going to be dwarfed by the problem of dealing with non-human identities.

Passwords 200
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to Remove Malware from WordPress Site (Malware Cleanup Guide)

Security Boulevard

If you suspect a hack or suspicious activity on your website, it can be a nerve-wracking experience. Until you know for sure, you cannot determine the reason, nor the solution. Wondering how to remove malware from WordPress site? Do not worry, we will help you clean malware from WordPress, determine the cause, and save you. Read more. The post How to Remove Malware from WordPress Site (Malware Cleanup Guide) appeared first on Malcare.

Malware 143
article thumbnail

Textbook Rental Scam

Schneier on Security

Here’s a story of someone who, with three compatriots, rented textbooks from Amazon and then sold them instead of returning them. They used gift cards and prepaid credit cards to buy the books, so there was no available balance when Amazon tried to charge them the buyout price for non-returned books. They also used various aliases and other tricks to bypass Amazon’s fifteen-book limit.

Scams 298
article thumbnail

Multi-Staged JSOutProx RAT Targets Indian Banks and Finance Companies

Quick Heal Antivirus

Quick Heal Security Labs has been monitoring various attack campaigns using JSOutProx RAT against different SMBs in. The post Multi-Staged JSOutProx RAT Targets Indian Banks and Finance Companies appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Banking 143
article thumbnail

How to keep your data off the Dark Web

Tech Republic Security

Traditional security solutions are no longer enough to protect your organization from a data breach, Bitglass says.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Attackers Weaponizing Zero-Days at Record Pace

Security Boulevard

Cybercriminals exploited a new remote code execution (RCE) zero-day, CVE-2021-40444, a week before a patch was released in September—that’s just one of the recent findings in a report by HP Wolf Security. On September 10, researchers discovered scripts on GitHub that automated the creation of the exploit, which ostensibly means that even less-savvy attackers can.

article thumbnail

Cybersecurity careers: What to know and how to get started

We Live Security

Want to help make technology safer for everyone? Love solving puzzles? Looking for a rewarding career? Break into cybersecurity! Insights from ESET researchers Aryeh Goretsky and Cameron Camp will put you on the right track. The post Cybersecurity careers: What to know and how to get started appeared first on WeLiveSecurity.

article thumbnail

Open XDR vs. SIEM

CyberSecurity Insiders

Matching Resources and Business Risk with the Right Solution. Gaining visibility and responding to attacks across the entire enterprise infrastructure (endpoints, servers, applications, SaaS, cloud, users, etc.) is a very tall order in today’s cybersecurity environment. Enterprises are forced to create complex security stacks consisting of SIEM , UEBA , SOAR, EDR, NDR , TIP and other tools in order to meet this challenge.

article thumbnail

Tech support scams top list of latest phishing threats

Tech Republic Security

Tech support scams work because they try to trick people into believing there's a serious security crisis with their computers, says Norton Labs.

Scams 180
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Russian-speaking cybercrime evolution: What changed from 2016 to 2021

SecureList

Experts at Kaspersky have been investigating various computer incidents on a daily basis for over a decade. Having been in the field for so long, we have witnessed some major changes in the cybercrime world’s modus operandi. This report shares our insights into the Russian-speaking cybercrime world and the changes in how it operates that have happened in the past five years.

article thumbnail

Email Cybersecurity Must Evolve to Combat Threats

Security Boulevard

Every business that takes cybersecurity seriously has a multi-layered approach to defending its uptime and data against the ocean of current threats. In 2021, those menaces range from ransomware to software supply chain attacks to breaches of cloud data repositories. To fight them, we deploy a variety of technologies in front of and inside our. The post Email Cybersecurity Must Evolve to Combat Threats appeared first on Security Boulevard.

article thumbnail

Top Open Source Security Tools

eSecurity Planet

Over the past quarter of a century, the open source movement has gone from strength to strength. But that success and the openness inherent in the community have led to a major challenge – security. The more software that is developed, the greater the likelihood there is for vulnerabilities. To make matters worse, the open source world prides itself on openness and transparency.

article thumbnail

Train to qualify for elite positions in the high-demand field of cybersecurity

Tech Republic Security

You don't have to go back to school or blow your budget to train for a career in cybersecurity, which is in high demand right now.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Beware of this Flubot malware that swept entire Australia

CyberSecurity Insiders

Most of the Australian mobile users who use profusely use internet have reportedly fallen prey to a malware dubbed as Flubot having potential to steal financial info and password logins from the victims’ phones. And information is out that the cyber criminals behind the spread of the Flubot malware are asking victims to download a security update to recover their device from the effects of the attack, a purported move to deepen the crisis.

Malware 139
article thumbnail

Free BlackByte decryptor released, after researchers say they found flaw in ransomware code

Graham Cluley

Security experts have released a free decryption tool that can be used by BlackByte ransomware victims to decrypt and recover their files. That's right - you don't need to pay the ransom. Predictably, the ransomware gang isn't happy.

article thumbnail

Groove ransomware calls on all extortion gangs to attack US interests

Bleeping Computer

The Groove ransomware gang is calling on other extortion groups to attack US interests after law enforcement took down REvil's infrastructure last week. [.].

article thumbnail

YouTube creators’ accounts hijacked with cookie-stealing malware

Security Affairs

A Cookie Theft malware was employed in phishing attacks against YouTube creators, Google’s Threat Analysis Group (TAG) warns. Financially motivated threat actors are using Cookie Theft malware in phishing attacks against YouTube creators since late 2019. According to Google’s Threat Analysis Group (TAG) researchers, who spotted the campaign, the attacks were launched by multiple hack-for-hire actors recruited on Russian-speaking forums.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.