article thumbnail

Akira ransomware gang used an unsecured webcam to bypass EDR

Security Affairs

They found unsecured IoT devices, including webcams and a fingerprint scanner, using them to bypass security defenses and successfully deploy the ransomware. Realizing EDR was active, they pivoted by scanning the network for vulnerable devices.

article thumbnail

Why Do Chief Security Officers Leave Jobs So Often?

Security Boulevard

Everyone knows that cybersecurity is a red-hot career field, and chief security officers (or chief information security officers in many organizations) are the ones leading the online security defense. Is it time to look elsewhere?

CISO 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Towards native security defenses for the web ecosystem

Google Security

Posted by Artur Janc and Lukas Weichselbaum, Information Security Engineers With the recent launch of Chrome 83, and the upcoming release of Mozilla Firefox 79, web developers are gaining powerful new security mechanisms to protect their applications from common web vulnerabilities.

article thumbnail

RansomEXX ransomware hit computer manufacturer and distributor GIGABYTE

Security Affairs

. “GIGABYTE, a major manufacturer of motherboards and graphics cards, confirmed that some servers were attacked by hackers today, and the security defense was activated as soon as possible. All affected internal services have resumed operation. Currently, production, sales and daily operations are not affected.”

article thumbnail

China-linked APT Silk Typhoon targets IT Supply Chain

Security Affairs

Microsoft has notified affected customers and is raising awareness to help mitigate Silk Typhoons threats, offering guidance to disrupt their operations and enhance security defenses. The group has been active since at least 2020, they use web shells for command execution and data theft.

article thumbnail

Operation Digital Eye: China-linked relies on Visual Studio Code Remote Tunnels to spy on Europen entities

Security Affairs

As a result, this technique may be challenging to detect and could evade security defenses.” ” State-sponsored hackers exploit public cloud infrastructure to camouflage their activity within regular network traffic and use legitimate tools to evade detection.

article thumbnail

New UEFI rootkit Black Lotus offered for sale at $5,000

Security Affairs

Black Lotus is able to disable security solutions, including Hypervisor-protected Code Integrity (HVCI), BitLocker, and Windows Defender. The rootkit is able to bypass security defenses like UAC and Secure Boot, it is able to load unsigned drivers used to perform a broad range of malicious activities.