#cybercriminals

[ follow ]
Privacy professionals
Theregister
1 month ago
Privacy professionals

IT helpdeskers increasingly targeted by cybercriminals

IT helpdesk workers are increasingly targeted by cybercriminals, a trend growing in success.
Attacks involve pretending to be an employee, requesting changes to identity access, and registering their device for insider access. [ more ]
Axios
1 month ago
Privacy professionals

Ransomware attacks aren't as sophisticated as you'd think

Cybercriminals are self-centered and egotistical.
Ransomware gangs are known to scam and betray each other. [ more ]
Theregister
1 month ago
Privacy professionals

Ransomware crews lean into infostealers for initial access

Infostealers are gaining popularity among cybercriminals for easy access into organizations' IT environments.
Methods such as brute-force attacks, credential stuffing, and exploiting vulnerabilities are common ways for cybercriminals to gain access to systems. [ more ]
Databreaches
2 months ago
Privacy professionals

Warzone RAT Sales and Support Actors in Malta and Nigeria Charged in U.S. Federal Indictments

Federal authorities seized internet domains used to sell RAT malware
Individuals in Malta and Nigeria were indicted for selling malware and supporting cybercriminals [ more ]
ComputerWeekly.com
5 months ago
Privacy professionals

Russian cyber criminal pleads guilty to running IPStorm botnet | Computer Weekly

Sergey Manikin, the operator of the IPStorm botnet has pled guilty to violating US fraud laws.
IPStorm was dismantled by the FBI and its partners, and had over 23,000 anonymous users.
The case serves as a warning that cybercriminals can face consequences regardless of their location. [ more ]
SecurityWeek
5 months ago
Privacy professionals

Google Suing Cybercriminals Who Delivered Malware via Fake Bard Downloads

Google is taking legal action against cybercriminals who delivered malware through websites claiming to offer its chat-based AI tool, Bard.
The company filed a lawsuit against the scammers behind the malicious sites and is seeking an order to stop them from setting up similar domains.
Google has also targeted threat actors who abused the DMCA to harm competitors by submitting bogus copyright takedowns. [ more ]
morePrivacy professionals
Information security
Axios
3 months ago
Information security

New research finds open-source code accelerated supply chain cyberattacks in 2023

Open-source code and legitimate hacking tools are contributing to the rise of software supply chain attacks.
More cybercriminal groups are sharing open-source tools and resources, making it easier for attackers to launch these attacks. [ more ]
Graham Cluley
10 months ago
Information security

BBC staffers warned of payroll data breach. Other firms also affected by MOVEit vulnerability

1. Organizations are vulnerable to data breaches due to unpatched vulnerabilities, such as the MoveIt vulnerability.
2. Organizations should take proactive measures to patch known security vulnerabilities to prevent data breaches.
3. Organizations should also ensure their staff are aware of the risks of data breaches and how to respond if one occurs. [ more ]
Tripwire
10 months ago
Information security

Decade-old critical vulnerability in Jetpack patched on millions of WordPress websites

/
1. Millions of WordPress websites have been vulnerable to a critical 10-year-old vulnerability in Jetpack, which has now been patched.
2. Attackers could have exploited the vulnerability to gain access to user information, including passwords, and even take control of the server hosting the WordPress website.
SecurityWeek
1 year ago
Information security

Ransomware Will Likely Target OT Systems in EU Transport Sector: ENISA

Ransomware has become the top threat to the transport sector in the EU, and the European Union Agency for Cybersecurity (ENISA) expects ransomware groups to disrupt operational technology (OT) systems.The overall number of cyberattacks targeting aviation, maritime, railway and road transport organizations has increased between January 2021 and October 2022, with cybercriminals responsible for most of the incidents (54%), according to a new report from ENISA.
DevOps.com
1 year ago
Information security

Awareness of Software Supply Chain Security Issues Improves

By: Mike Vizard on
A global survey of 167 software professionals suggested that, while there is a lot more awareness of application security issues, the adoption of DevSecOps best practices is still not pervasive.The survey, conducted by Chainguard, the Eclipse Foundation, the Rust Foundation and the Open Source Security Foundation (OpenSSF), found that just over half (51%) of respondents are either concerned or are extremely concerned about software supply chain security.
TechRepublic
1 year ago
Information security

First Dero cryptojacking campaign targets unprotected Kubernetes instances

Learn how this cryptocurrency campaign operates and its scope.Then, get tips on protecting vulnerable Kubernetes instances from this cybersecurity threat.The cybersecurity company CrowdStrike has observed the first-ever Dero cryptojacking campaign.The attack targets Kubernetes clusters that were accessible on the internet and allowed anonymous access to the Kubernetes API.
moreInformation security
Sun Sentinel
10 months ago
Miami

Miramar dental insurer sued after hackers steal info about 8.9 million people

It doesn't take long after announcing a data breach for companies to become targets of class-action lawsuits.One such company, Miramar-based Managed Care of North America Dental, reported on May 26 that it suffered a ransomware breach between Feb. 26 and March 7 that affected 8.9 million individuals.
Digital life
Acm
11 months ago
Digital life

DarkBert AI was Trained using Dark Web data

Following the success of OpenAI's , Microsoft's and Google Bard, researchers have created a new AI model with a much darker twist.While the large language models (LLMs) that power ChatGPT and Google Bard were trained on data from the open web, DarkBERT was trained exclusively on data from the .Yes, you read that correctly, this new AI model was trained using data from hackers, cybercriminals and other scammers.
Acm
1 year ago
Digital life

Passkeys Unlock a New Era for Authentication

Few things evoke a level of disdain on par with computer passwords.They are inconvenient and incredibly insecure.Cybergangs attack them, hack them, and constantly wreak havoc with them.According to industry statistics, upwards of 80% of all breaches involve passwords in one form or another.Even more advanced multifactor authentication (MFA), whether in the form of text codes or rolling numbers on an authentication app, does not address the underlying problem.
Acm
1 year ago
Digital life

Cybercriminals Cashing In on FIFA World Cup-Themed Cyberattacks

The hype and popularity of the FIFA World Cup has attracted audiences from across the globe.And this, in turn attracts a variety of cybercriminals, who want to exploit the varied fan following, and the organizations participating, to make a quick buck.Advanced persistent threat (APT) campaigns, phishing, credit card/cryptocurrency fraud, DDoS attacks, and identity theft are among the threats faced by organizations and audiences, CloudSEK reports.
moreDigital life
Theregister
11 months ago
Privacy professionals

No more macros? No problem, say attackers, we'll adapt

Microsoft's decision to block internet-sourced macros by default last year is forcing attackers to find new and creative ways to compromise systems and deliver malware, according to threat researchers at Proofpoint."The cybercriminal ecosystem has experienced a monumental shift in activity and threat behavior over the last year in a way not previously observed by threat researchers," the security team wrote in a report [ PDF] just before the weekend.
Brooklyneagle
11 months ago
Privacy professionals

Columbian Lawyers bring in cybersecurity expert for monthly meeting

On Wednesday, May 3, the Columbian Lawyers Association of Brooklyn hosted a monthly meeting at Gargiulo's Restaurant in Coney Island, where attorney Daniel Garrie, a top voice in the cybersecurity and computer forensic space for over 20 years, gave an enlightening lecture on cybersecurity.The issue has become increasingly important since the pandemic, Columbian Lawyers President Salvatore Scibetta explained.
investigation
SecurityWeek
11 months ago
Information security

Australian Enterprise Software Maker TechnologyOne Resumes Trading Following Hack

Australian enterprise resource planning solutions provider TechnologyOne halted trading for a couple of days this week after detecting unauthorized access to some of its systems.The enterprise software maker halted trading on May 10, revealing in a statement that hackers had targeted its "internal Microsoft 365 back-office system".
TechRadar
1 year ago
Privacy professionals

ChatGPT is being used to lure victims into downloading malware

(Image credit: CKA via Shutterstock)
Hackers are trying to capitalize on the enormous popularity of ChatGPT to distribute malware, security experts have warned.A report from cybersecurity researchers CloudSEK has detailed an elaborate scheme that includes stolen Facebook accounts, groups, and pages, malicious Facebook ads, and fake ChatGPT software.
SecurityWeek
1 year ago
Privacy professionals

Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm

Sustainable energy giant Hitachi Energy has blamed a data breach affecting employees on the exploitation of a recently disclosed zero-day vulnerability in Fortra's GoAnywhere managed file transfer (MFT) software.In a press release published on Friday, Hitachi Energy said the Cl0p ransomware gang targeted the GoAnywhere product and may have gained unauthorized access to employee data in some countries.
www.kvue.com
1 year ago
Privacy professionals

US Marshals Service suffers 'major' breach

WASHINGTON In a major breach of a U.S. Marshals Service computer system this month with ransomware, hackers stole sensitive and personally identifiable data about agency employees and targets of investigations, an agency spokesman said Tuesday.The hacked system was disconnected from the network shortly after the breach and stolen data were discovered Feb. 17.
www.standard.co.uk
1 year ago
Privacy professionals

The FBI now recommends using an ad blocker when searching the web

T he Federal Bureau of Investigation (FBI) in the US is advising people to use ad blockers as part of a warning about the threat of scams online.In a public service announcement, the security agency's internet complaints department says ad-blocking extensions can help to protect users against fraudulent online adverts that appear in search results.
www.cnn.com
1 year ago
Privacy professionals

Cybercriminals behind Los Angeles Unified School District ransomware attack release hacked data, superintendent says

Cybercriminals who targeted the Los Angeles Unified School District, the second largest in the nation, with a ransomware attack have released some of the hacked data online, according to a tweet from LAUSD Superintendent Alberto M. Carvalho.
moreinvestigation
SecurityWeek
11 months ago
Privacy professionals

Google Now Lets US Users Search Dark Web for Their Gmail ID

Gmail users in the US can now run scans to find out whether their Gmail ID appears on the dark web, Google announced today at Google I/O, its annual developer conference.The feature was initially announced in March, when the internet giant released it for Google One users only.It allows users to run scans and receive a report informing them whether their information, including name, address, email address, phone number, and Social Security number, appears on dark web portals.
SecurityWeek
11 months ago
Privacy professionals

Capita Says Ransomware Attack Will Cost It Up to $25 Million

UK-based business process outsourcing and professional services company Capita said on Wednesday that it expects to incur costs ranging between roughly £15 million ($19 million) and £20 million ($25 million) as a result of the recent cybersecurity incident, but it has not clarified whether that includes a ransom payment to the hackers.
SecurityWeek
11 months ago
Privacy professionals

Western Digital Confirms Ransomware Group Stole Customer Information

Western Digital confirmed on Friday that cybercriminals have stolen customer and other information after breaching its systems.According to the digital storage giant, a security breach was discovered on March 26.In early April, the company shut down some services as part of its incident response activities and informed customers about a cyberattack, but has not shared any updates until May 5.
Western Digital's second public statement comes just days after a ransomware group known as Alphv/BlackCat started publishing screenshots showing the extent of their access.
SecurityWeek
1 year ago
Information security

Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager

Founded in 1872, the company provides ship management services to hundreds of organizations in the maritime industry, including monitoring of incoming and outgoing vessel traffic in ports, emergency response services, and more.Royal Dirkzwager fell victim to the cyberattack on March 6, being forced to take systems offline and suspend several services.
SecurityWeek
1 year ago
Information security

Ransomware Attack Forces Produce Giant Dole to Shut Down Plants

Produce giant Dole has been forced to shut down plants as a result of a ransomware attack that appears to have resulted in product shortages in some grocery stores.In a statement posted on its website on Wednesday, Dole said it was dealing with a cybersecurity incident involving ransomware.The company has contacted law enforcement and external cybersecurity experts to help it address and investigate the attack.
TechRepublic
1 year ago
Information security

This 18-course ethical hacking bundle is under $50

Ethical hacking is a great skill to learn with new cyber threats on the rise.Learn how to fight back with this ethical hacking course bundle.After pretty much every form of cyberattack increased in 2022, cybercriminals have since found even more ways to target small businesses, from levying more sophisticated phishing attacks to taking advantage of vulnerable NFTs.
Boston.com
1 year ago
Boston

Ransomware attack shuts down school district in South Coast town

Swansea Public Schools canceled classes Wednesday following a ransomware attack that shut down the district's network, according to the school superintendent."The cyber security company, with whom we contract, is working today to ascertain the extent of the attack on our network," Superintendent of Schools John J. Robidoux wrote on Twitter.
SecurityWeek
11 months ago
Privacy professionals

Meta Swiftly Neutralizes New 'NodeStealer' Malware

Facebook parent company Meta says it disrupted a novel malware family within weeks after it emerged earlier this year.Dubbed NodeStealer, the threat was designed to steal cookies and usernames and passwords from browsers such as Chrome, Edge, Brave, and Opera, to compromise online accounts.A custom JavaScript malware first observed in January 2023, NodeStealer is likely of Vietnamese origin, being distributed disguised as PDF and XLSX files.
Vulture
1 year ago
Books

Filippo Bernardini Gave the Publishing World Something to Write About

On Thursday afternoon, a judge finally brought an end to the strange case of Filippo Bernardini, the Italian man who pleaded guilty earlier this year to impersonating hundreds of people in the book-publishing industry in order to steal unpublished manuscripts.While the government argued that Bernardini should spend a year in prison, Judge Colleen McMahon didn't agree.
SecurityWeek
1 year ago
Privacy professionals

Coinbase Hack Linked to Group Behind Last Year's Twilio, Cloudflare Attacks

Coinbase, one of the world's largest cryptocurrency exchanges, was recently targeted in a sophisticated cyberattack that appears to have been conducted by the same threat group that targeted Twilio, Cloudflare and many others last year.Coinbase revealed on Friday that its employees were targeted in an SMS phishing campaign on Sunday, February 5.
PCMAG
1 year ago
Privacy technologies

FBI Recommends Installing An Ad Blocker To Dodge Scammers

It's a good idea to install an ad blocker to help you avoid online scams -and apparently the FBI agrees.On Wednesday, the agency issued the recommendation in an alert(Opens in a new window)  about avoiding malicious ads over search engines.The threat of so-called " malvertising " has been around for years, but what was notable about the FBI's alert was its advice on how consumers can protect themselves from the threat.
The Verge
1 year ago
Apple

Apple is reportedly preparing to allow third-party app stores on the iPhone

Apple is planning to let users install alternative app stores on iOS, according to a report from Bloomberg.The shift would be a remarkable change from the company, which has famously only allowed iPhone and iPad users to download apps from the App Store.The plans are reportedly being spurred on by the EU's Digital Markets Act (DMA), which is meant to enact "rules for digital gatekeepers to ensure open markets" when its restrictions become a requirement in 2024, according to a press release.
The Verge
1 year ago
Tech industry

Microsoft's out-of-date driver list left Windows PCs open to malware attacks for years

Although Microsoft says its Windows updates add new malicious drivers to a blocklist downloaded by devices, Ars Technica found these updates never actually stuck.The documentation page will be updated as new updates are released."Microsoft has since provided instructions on how to manually update the blocklist with the vulnerable drivers that have been missing for years, but it's still not clear when Microsoft will start automatically adding new drivers to the list through Windows updates.
www.theguardian.com
1 year ago
Privacy professionals

AI chatbots making it harder to spot phishing emails, say experts

Chatbots are taking away a key line of defence against fraudulent phishing emails by removing glaring grammatical and spelling errors, according to experts.Phishing emails are a well-known weapon of cybercriminals and fool recipients into clicking on a link that downloads malicious software or tricks them into handing over personal details such as passwords or pin numbers.
Theregister
1 year ago
Privacy professionals

How much will each stolen SSN cost you? How about $.75k

A Florida healthcare group has settled a class-action lawsuit after thieves stole more than 447,000 patients' names, Social Security numbers, and sensitive medical information, from its servers.Under the settlement [ PDF], Orlando Family Physicians, which operates 10 clinics in central Florida, will reimburse affected patients who submit a claim by July 1, and provide them with two years of free credit monitoring.
SecurityWeek
1 year ago
Privacy professionals

Zoll Medical Data Breach Impacts 1 Million Individuals

Medical technology developer Zoll Medical is notifying roughly one million individuals that their personal information might have been compromised in a recent data breach.Zoll develops and markets medical equipment and software for advanced emergency care, including cardiac monitoring, oxygen therapy, ventilation, data management, and more.
ComputerWeekly.com
1 year ago
Privacy professionals

Security Think Tank: New trends and drivers in cyber security training | Computer Weekly

Maksim Kabakou - Fotolia

By
Cyber security training is a vital security strategy for many enterprises across the world.Such training has been established at large companies and government organisations for many years now.Small to medium size businesses have increasingly seen the value in contracting in training to help users avoid common security issues.
SecurityWeek
1 year ago
Privacy professionals

Canadian Bookstore Chain Indigo Says Employee Data Stolen in Ransomware Attack

Canadian bookstore chain Indigo this week confirmed that the personal information of both current and former employees was stolen in a ransomware attack last month.The hack, Indigo says, took place on February 8 and resulted in the company taking down affected systems to contain the incident.The company was able to restore online payments and exchanges and returns two weeks ago.
SecurityWeek
1 year ago
Privacy professionals

Ransomware Operators Leak Data Allegedly Stolen From City of Oakland

Over the weekend, the cybercriminals behind the Play ransomware published data allegedly stolen from the City of Oakland last month.The cyberattack started on February 8 and was disclosed on February 10, when Oakland announced that it had taken systems offline to contain the incident, but that emergency services were not impacted.
Social Media Explorer
1 year ago
Online marketing

Cybersecurity Experts Warn Twitter Breach Will Have Lasting Ramifications - Social Media Explorer

A hacker forum posted the account information of around 200 million Twitter users for no cost.getty After a ransomware infection, the United States Conference of Mayors unanimously voted to stop paying ransoms to hackers in July 2019.Cybersecurity experts heralded the decision, and numerous companies have also taken a stance that a ransom should never be paid - as doing so will only likely result in future attacks from bad actors.
TechRepublic
1 year ago
Artificial intelligence

Humans are still better at creating phishing emails than AI - for now

AI-generated phishing emails, including ones created by ChatGPT, present a potential new threat for security professionals, says Hoxhunt.Amid all of the buzz around ChatGPT and other artificial intelligence apps, cybercriminals have already started using AI to generate phishing emails.For now, human cybercriminals are still more accomplished at devising successful phishing attacks, but the gap is closing, according to security trainer Hoxhunt's new report released Wednesday.
www.cbc.ca
1 year ago
Canada news

Indigo hit by 'cybersecurity incident' impacting sales online and in-store | CBC News

Indigo Books & Music Inc. is dealing with what it calls a "cybersecurity incident" that has affected customer orders in-store and online.It started at the Toronto-based retailer on Wednesday.As of Friday afternoon, Indigo's website was still offline."We are working with third-party experts to investigate and resolve the situation," the company said in a message posted on its website.
TechRepublic
1 year ago
Information security

Security warning: Beep malware can evade detection

Find out how Beep malware can evade your security system, what it can do and how to protect your business.Cybersecurity experts at Minerva recently made a stunning discovery of a new malware tagged Beep that has the features to evade detection and analysis by security software.The cybersecurity organization discovered Beep after samples were uploaded on VirusTotal.
Theregister
1 year ago
Privacy professionals

Ransomware victims refuse to pay up

The amount of money paid to ransomware attackers dropped significantly in 2022, and not because the number of attacks fell.It's that more victims are refusing to pay the ransoms, blockchain research firm Chainalysis said in a report Thursday.They estimate that since 2019, victim payment rates have fallen from 76 percent to just 41 percent.
TechRepublic
1 year ago
Information security

The security skills shortage is here, here's how to prepare

Corporate security is near the top of the list of CIO concerns for 2023 - but a security skills shortfall is also a problem.What can companies do to bring up the slack?In 2022, cybersecurity firm Fortinet conducted research that revealed 80% of organizations suffered one or more breaches that they could attribute to a lack of cybersecurity skills and awareness, 64% of organizations experienced breaches that resulted in lost revenue or cost them fines during the past year, and 38% of organizations reported breaches that cost them over one million dollars.
Technology Solutions That Drive Business
1 year ago
Information security

Palo Alto Ignite Reveals The Biggest Cybersecurity Threats of 2022

These days, every organization comes up against cybercriminals.Each new device, user or data point expands the attack surface, giving threat actors more opportunities to compromise environments.At Palo Alto Ignite '22, hosted by Palo Alto Networks, threat intelligence experts recapped the biggest threats of 2022.
SecurityWeek
1 year ago
Privacy professionals

Data Security Firm Rubrik Targeted With GoAnywhere Zero-Day Exploit

Cloud data management and data security firm Rubrik has confirmed being targeted in an attack exploiting a recent GoAnywhere zero-day vulnerability after a ransomware group named the company on its leak website.Fortra, previously known as HelpSystems, alerted users of its GoAnywhere managed file transfer (MFT) software on February 1 about a zero-day remote code injection exploit.
SecurityWeek
1 year ago
Information security

Microsoft SmartScreen Zero-Day Exploited to Deliver Magniber Ransomware

A cybercrime group has been exploiting a zero-day vulnerability in the Microsoft SmartScreen security feature to deliver the Magniber ransomware, Google warned on Tuesday.Google's Threat Analysis Group (TAG) said the vulnerability, tracked as CVE-2023-24880, has been exploited since at least January.
DevOps.com
1 year ago
Information security

ReversingLabs Adds Ability to Detect Secrets in Application Binaries

By: Mike Vizard on
ReversingLabs today announced it added an ability to detect secrets exposed in application binaries to its Software Supply Chain Security (SSCS) platform.Tomislav PeriÄŤin, chief software architect for ReversingLabs, said this addition will make it easier for DevSecOps teams to identify secrets that are inadvertently left in applications as plain text or that can be discovered because of weak cryptography, scripts that have been included in directories that have secrets configuration files, packaging automation mistakes, compromised developer accounts or the activities of malicious insiders.
SecurityWeek
1 year ago
Information security

Cybercrime Gang Uses Screenlogger to Identify High-Value Targets in US, Germany

A recently identified financially motivated threat actor is targeting companies in the United States and Germany with custom malware, including a screenlogger it uses for reconnaissance, Proofpoint reports.Tracked as TA866, the adversary appears to have started the infection campaign in October 2022, with the activity continuing into January 2023.
Theregister
1 year ago
Privacy professionals

ESXiArgs ransomware fights back to defeat US recovery script

That didn't take long.A week after the US Cybersecurity and Infrastructure Security Agency (CISA) and FBI released a recovery script to help victims of the widespread ESXiArgs ransomware attacks recover infected systems, an updated variant of the malware aimed at vulnerable VMware ESXi virtual machines can't be remediated with the government agencies' code, according to Malwarebytes.
SecurityWeek
1 year ago
Information security

Mirai Variant V3G4 Targets 13 Vulnerabilities to Infect IoT Devices

During the second half of 2022, a variant of the Mirai malware called V3G4 was seen targeting 13 vulnerabilities to ensnare Internet of Things (IoT) devices into a botnet, Palo Alto Networks reports.Following the successful exploitation of the targeted security flaws, the malware takes full control of the vulnerable devices and then abuses them to conduct various types of malicious activities, including distributed denial-of-service (DDoS) attacks.
SecurityWeek
1 year ago
Privacy professionals

HardBit Ransomware Offers to Set Ransom Based on Victim's Cyberinsurance

The operators of a fairly new ransomware operation named HardBit are prepared to negotiate the ransom amount with their victims based on their cyberinsurance policy.The HardBit ransomware emerged in October 2022, with version 2.0 launched in late November.In a blog post published on Monday, data security company Varonis reported seeing samples of the malware throughout the rest of 2022 and into 2023.
TechRadar
1 year ago
Privacy professionals

The NSA has some pretty obvious security advice for remote workers

(Image credit: Bryn Colton/ Getty Images)
The National Security Agency (NSA) has published some new advice for those working from home to secure their work devices and home networks.In issuing some fairly basic and standard advice, it noted that those in telecommunications specifically should make sure their user and networking devices are kept up to date to prevent compromises to their own and their organization's security posture.
www.kvue.com
1 year ago
Privacy professionals

Health data breach hitting Congress 'could be extraordinary'

WASHINGTON Hackers who broke into a Washington, D.C. health insurance marketplace stole sensitive personal data on members of Congress, their employees and family and the size and scope of the impact could be extraordinary, House leadership says.DC Health Link, which runs the exchange, said an unspecified number of customers were affected and it was notifying them and working with law enforcement to quantify the damage.
Theregister
1 year ago
Information security

It's official: BlackLotus malware can bypass secure boot

BlackLotus, a UEFI bootkit that's sold on hacking forums for about $5,000, can now bypass Secure Boot, making it the first known malware to run on Windows systems even with the firmware security feature enabled.Secure Boot is supposed to prevent devices from running unauthorized software on Microsoft machines.
www.cnn.com
1 year ago
US politics

Russian man accused of selling prolific hacking tool extradited to US

A 28-year-old Russian man accused of developing and selling a hacking tool used to obtain the login information for tens of thousands of computers worldwide was arrested in the country of Georgia and extradited to the US, the Justice Department said Wednesday.Dariy Pankov is accused of advertising access to more than 35,000 computers, earning more than $350,000 in illicit sales, and enabling cybercriminals to conduct ransomware attacks and tax fraud, prosecutors said.
www.cnn.com
1 year ago
US politics

US introduces new rules to protect water systems from hackers

The US Environmental Protection Agency on Friday announced new requirements for public water facilities to boost their cybersecurity while expressing concern that many facilities have failed to take basic steps to protect themselves from hackers.The new EPA memo requires state governments to audit the cybersecurity practices of public water systems and then use state regulatory authorities to force water systems to add security measures if existing ones are deemed insufficient.
www.cnn.com
1 year ago
US politics

Senior FBI official warns US states about threat posed by Chinese hackers

A senior FBI official warned secretaries of state from across the US Thursday that Chinese hackers pose a growing threat and said their willingness to target the infrastructure of political parties ahead of the 2022 election demonstrates that we could see more significant Chinese cyber activity against your states in the coming year.
www.cnn.com
1 year ago
US politics

US and UK sanction Russian cybercriminal gang accused of infecting millions of computers worldwide

The US and UK governments on Thursday sanctioned six Russians and one Ukrainian for their alleged involvement in an infamous Russia-based cybercrime network that infected millions of computers worldwide, including those in American hospitals.The sanctions target seven alleged core members of a cybercrime gang known as Trickbot, whose eponymous hacking tool has for years stalked US critical infrastructure, the US Treasury Department said in a statement.
SecurityWeek
1 year ago
Privacy professionals

Cybercrime Marketplace Leaks Over 2.1 Million Payment Cards

Carding marketplaces, also referred to as card shops, are cybercrime websites that facilitate the trading and unauthorized use of stolen payment card details.Active for less than a year, BidenCash has quickly become one of the top carding marketplaces, making a name for itself by releasing the details of hundreds of thousands of cards in June 2022.
DevOps.com
1 year ago
Information security

Survey: More Cybersecurity Pros Embedded in DevOps Teams

By: Mike Vizard on
A survey of 2,500 C-level executives published today by Palo Alto Networks found 81% of organizations have embedded cybersecurity professionals within their DevOps teams.Despite the presence of those cybersecurity professionals, however, the survey also suggested there is much work to do in terms of optimizing DevSecOps workflows.
The Verge
1 year ago
Information security

1Password is trying for zero passwords

1Password is announcing today that, one day soon, it will support the option to create and unlock 1Password accounts using biometric-based passkey technology, ditching the feature that is the name of its entire product."For passkeys to be the way forward, it's not enough for them to replace some of your passwords," said 1Password chief product officer Steve Won.
Theregister
1 year ago
Information security

Logfile nightmare deepens thanks to critical VMware flaws

VMware has issued fixes for four vulnerabilities, including two critical 9.8-rated remote code execution bugs, in its vRealize Log Insight software.There are no reports (yet) of nation-state thugs or cybercriminals finding and exploiting these bugs, according to VMware.However, it's a good idea to patch sooner than later to avoid being patient zero.
SecurityWeek
1 year ago
Privacy professionals

US Government Agencies Warn of Malicious Use of Remote Management Software

The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC) are warning organizations of malicious attacks using legitimate remote monitoring and management (RMM) software.IT service providers use RMM applications to remotely manage their clients' networks and endpoints, but threat actors are abusing these tools to gain unauthorized access to victim environments and perform nefarious activities.
www.cnn.com
1 year ago
Privacy professionals

Scammers posed as tech support to hack employees at two US agencies last year, officials say

Cybercriminals hacked employees of at least two US federal civilian agencies last year as part of a widespread fraud campaign that sought to steal money from individuals' bank accounts, US cybersecurity officials revealed Wednesday.In one case, the unidentified hackers posed as tech support, convinced a federal employee to call them and then instructed the federal employee to visit a malicious website, according to the advisory from the US Cybersecurity and Infrastructure Security Agency, National Security Agency and a threat-sharing center for state and local governments known as MS-ISAC.
VentureBeat
1 year ago
Data science

IBM: Quantum computing poses an 'existential threat' to data encryption

Check out all the on-demand sessions from the Intelligent Security Summit here.For years, encryption has played a core role in securing enterprise data.However, as quantum computers become more advanced, traditional encryption solutions and public-key cryptography (PKC) standards, which enterprise and consumer vendors rely on to secure their products, are at serious risk of decryption.
Tech Monitor
1 year ago
Privacy professionals

Malvertising on Google Ads is a growing problem that isn't going away

Malvertising campaigns impacting Google Ads are on the rise.While the technique of convincing internet users to download malware by clicking on seemingly legitimate adverts is not a new one, its popularity has spiked due to an increase in the sophistication of malware as well as the value of credentials they can be harvested.
Theregister
1 year ago
Privacy professionals

Twitter sued over alleged data leak exposing 200m users' PII

A Twitter user has sued the troubled social media platform over an alleged data leak that exposed more than 200 million account users' information.In a class-action lawsuit [PDF] filed January 13 in a US district court in San Francisco, Stephen Gerber claims Twitter exposed his and "tens of millions" of other users' personal information - specifically email addresses and phone numbers linked to accounts - between June 2021 and January 2022 because of an API flaw.
www.nytimes.com
1 year ago
Privacy professionals

A Breach at LastPass Has Password Lessons for Us All

While many of us were unplugging from the internet to spend time with loved ones over the holidays, LastPass, the maker of a popular security program for managing digital passwords, delivered the most unwanted gift.It published details about a recent security breach in which cybercriminals had obtained copies of customers' password vaults, potentially exposing millions of people's online information.
Harvard Business Review
1 year ago
Business

Your Company's Data Is for Sale on the Dark Web. Should You Buy It Back?

One day I got a call from Sarah*, the in-house counsel at a large financial institution."Our [information security] team was doing a routine search and found a list of our employee passwords for sale on the dark web," she told me."The business folks want to buy it back.What should we do?
Washington Post
1 year ago
Business

Analysis | What Is a Cold Wallet? A Guide to Popular Crypto Terms

A screen displaying the price of Bitcoin during the Bitcoin 2022 conference in Miami, Florida, U.S., on Friday, April 8, 2022.The Bitcoin 2022 four-day conference is touted by organizers as "the biggest Bitcoin event in the world."Photographer: Eva Marie Uzcategui/Bloomberg (Bloomberg)The crypto community has a lexicon of buzzwords and slang that can seem like a foreign language to the uninitiated.
VentureBeat
1 year ago
Privacy professionals

Google AdWords scam epidemic shows social engineering is evolving

Check out all the on-demand sessions from the Intelligent Security Summit here.Social engineering scams are everywhere.Every day, cybercriminals are using whatever medium they can to trick users into handing over their data.This not only includes email, SMS and messaging services, but also online advertising services.
The US Sun
1 year ago
Privacy professionals

FBI warns Google users to use important feature to 'stop bad guys' ensnaring you

GOOGLE users have been warned it's time to go ad-free as cyber advertisement scams continue to wreak havoc across the internet.The FBI released a warning last week saying cyber criminals are using search engine advertisement services to "impersonate brands and direct users to malicious sites."
TechCrunch
1 year ago
Privacy technologies

Even the FBI says you should use an ad blocker

This holiday season, consider giving the gift of security with an ad blocker.That's the takeaway message from an unlikely source - the FBI - which this week issued an alert warning that cybercriminals are using online ads in search results with the ultimate goal of stealing or extorting money from victims.
TechRepublic
1 year ago
Information security

Cisco Talos report: Threat actors use known Excel vulnerability

Microsoft Office files, particularly Excel and Word files, have been targeted by some cybercriminals for a long time.Through different techniques, attackers have used embedded Visual Basic for Applications macros to infect computers with different kinds of malware for cybercrime and cyberespionage.In most cases, users still needed to click their agreement when executing code inside those applications, but some social engineering tricks have enticed unsuspecting victims to click and allow the execution of the malicious macros themselves.
DevOps.com
1 year ago
Information security

Rezilion Updates Open Source MI-X Tool to Better Secure App Development

By: Mike Vizard  on  
Rezilion has updated its open source MI-X vulnerability discovery tool to include mitigation and remediation recommendations.In addition, the tool can now produce machine-readable output in either a JSON or CSV format.Finally, the company added Windows support for Heartbleed and SpookySSL vulnerabilities in Windows environments.
Theregister
1 year ago
Privacy professionals

Legit Android apps poisoned by sticky 'Zombinder' malware

Threat researchers have discovered an obfuscation platform that attaches malware to legitimate Android applications to lure users to install the malicious payload and make it difficult for security tools to detect.Analysts with cybersecurity vendor ThreatFabric found the platform, named "Zombinder," on the darknet while investigating a campaign that targeted both Android and Windows users with different types of malware.
DevOps.com
1 year ago
Software development

Chainguard Adds Private Edition of Code Signing Platform

By: Mike Vizard  on  
Chainguard today added a private preview of a Chainguard Enforce Signing service, enabled by the open source Sigstore project, that allows developers to generate digital signatures for software artifacts using identities and one-time-use keys they create themselves.Kim Lewandowski, head of product for Chainguard, said Chainguard Enforce Signing provides an alternative to relying on a public service to generate those digital signatures.
Theregister
1 year ago
Marketing

Criminals use trending TikTok challenge to spread malware

Malware-slinging miscreants are taking advantage of a trending TikTok challenge - and viewers' dirty minds - to spread data-stealing malware via a phony app that's had more than one million views so far.The new TikTok trend is called Invisible Challenge, and it involves a person filming themself naked while using an effect called Invisible Body that removes the body from the video.
Theregister
1 year ago
Information security

Discontinued Boa web servers still a supply chain threat

Microsoft is warning that systems using the long-discontinued Boa web server could be at risk of attacks after a series of intrusion attempts of power grid operations in India likely included exploiting security flaws in the technology.Those affected may be unaware that their devices run services using the discontinued Boa web server, and that firmware updates and downstream patches do not address its known vulnerabilities

Researchers with Microsoft's Security Threat Intelligence unit examined an April report from cybersecurity company Recorded Future about the intrusion efforts into India's power grid dating back to 2020 and, more recently, into a national emergency response system and a global logistics company's Indian subsidiary.
DevOps.com
1 year ago
DevOps

Critical Vulnerability Discovered in Open Source Backstage Platform

By: Mike Vizard  on  
Oxeye today disclosed that it has discovered a critical vulnerability in the open source Backstage software used to build developer portals.Backstage was originally created by Spotify.A 1.5.1 update to the Backstage platform remediated a sandbox escape vulnerability that can occur via a third-party Scaffolder plug-in that could be used to conduct unauthenticated remote code execution (RCE).
DevOps.com
1 year ago
DevOps

Pulumi Adds Deployment Capability to IaC Platform

By: Mike Vizard  on  
At the Pulumi Cloud Engineering Days event, Pulumi announced today it has added a code deployment capability to its Pulumi Cloud platform for managing infrastructure-as-code (IaC).Pulumi CEO Joe Duffy said Pulumi Deployments will make it possible for DevOps teams to provision infrastructure and deploy applications via a single Git commit that can be invoked via an application programming interface (API) or graphical tool.
Theregister
1 year ago
Privacy professionals

Oh, look: More malware in the Google Play store

in brief A quartet of malware-laden Android apps from a single developer have been caught with malicious code more than once, yet the infected apps remain on Google Play and have collectively been downloaded more than one million times.The apps come from developer Mobile apps Group, and are infected with the Trojan known as HiddenAds, said security shop Malwarebytes.
App Developer Magazine
1 year ago
Information security

Open Bug Bounty has fixed 1 million vulnerabilities| App Developer Magazine

Open Bug Bounty is an open, disintermediated, cost-free, and community-driven Bug Bounty platform for coordinated, responsible, and ISO 29147 compatible vulnerability disclosure.It passed the milestone on 27 October of fixing over 1,000,000 web security vulnerabilities.The Open Bug Bounty project enables website owners to receive advice and support from security researchers around the globe in a transparent, fair, and coordinated manner to make web applications better and safer for everyone's benefit.
Tom's Guide
1 year ago
Privacy professionals

You should think twice before clicking on ads - even on Google Search

In addition to cyberattacks, phishing attacks and malicious apps, cybercriminals can also abuse Google Ads to trick users into falling for their schemes.As reported by BleepingComputer (opens in new tab), if you searched for 'GIMP' on Google last week you may have seen an ad for the official website of the popular Photoshop alternative.
Theregister
1 year ago
Privacy professionals

Cranefly threat group uses innocent-looking info-stealer

A threat group that targets corporate emails is delivering dropper malware through a novel technique that uses Microsoft Internet Information Services (IIS) logs to send commands disguised as web access requests.The dropper, dubbed Geppei, is being used by a group Symantec threat researchers call Cranefly to install other undocumented malware.
Theregister
1 year ago
Privacy professionals

Crooks use POS malware to steal 167,000 credit card numbers

Cybercriminals have used two strains of point-of-sale (POS) malware to steal the details of more than 167,000 credit cards from payment terminals.If sold on underground forums, the haul could net the thieves upwards of $3.3 million.The backend command-and-control (C2) server that operates the MajikPOS and Treasure Hunter malware remains active, according to Group-IB's Nikolay Shelekhov and Said Khamchiev, and "the number of victims keeps growing," they said this week.
Fatherly
1 year ago
Fathers

The FBI Warns Borrowers: Don't Fall For These Student Loan Scams

Earlier this week, the Biden administration's Department of Education officially launched its student debt forgiveness platform, allowing millions of borrowers to apply for student loan cancelation following a weekend of beta testing to ensure a smooth process.
Boston.com
1 year ago
Boston

Local tech support scams are on the rise, FBI says

"In some cases, we've seen victims lose their entire life savings."
People are falling victim to scammers pretending to be tech support, and they're losing millions of dollars.
TechRadar
1 year ago
Privacy professionals

The biggest cyber-threats hitting firms working remotely during the Covid-19 crisis

As the nation's businesses hunkered down to work at home, criminal groups not only continued their attacks, but also adapted their tactics to exploit the security gaps that opened up.
TechRepublic
1 year ago
Information security

New Alchimist attack framework hits Windows, Linux and Mac

A standalone Command and Control (C2) server called "Alchimist" was recently discovered by Cisco Talos.
TechRepublic
1 year ago
Information security

Facebook warns of 400 malicious apps that tried to steal your account credentials

Previously available on Apple's App Store and Google Play, the phony apps impersonated photo editors, games, VPN services and utilities to trick users into sharing their Facebook credentials.
Theregister
1 year ago
Privacy professionals

Eternity threat group's LilithBot: A criminal multitool

A Russia based threat group that set up a malware distribution shop earlier this year is behind a Swiss Army knife-like botnet that comes with a range of other malicious capabilities, from stealing information to mining cryptocurrency.
TechRepublic
1 year ago
Information security

How ransomware gangs operate like legitimate businesses

Today's ransomware groups act like regular businesses with PR and advertising, escrow services and even customer support, says Cybersixgill.
TechRepublic
1 year ago
Information security

Colonial Pipeline ransomware group using new tactics to become more dangerous

Dubbed Coreid, the group has adopted a new version of its data exfiltration tool and is offering more advanced capabilities to profitable affiliates, says Symantec.
[ Load more ]