Wed.Sep 29, 2021

article thumbnail

The Rise of One-Time Password Interception Bots

Krebs on Security

In February, KrebsOnSecurity wrote about a novel cybercrime service that helped attackers intercept the one-time passwords (OTPs) that many websites require as a second authentication factor in addition to passwords. That service quickly went offline, but new research reveals a number of competitors have since launched bot-based services that make it relatively easy for crooks to phish OTPs from targets.

Passwords 311
article thumbnail

NSA, CISA Release VPN Security Guidance

Data Breach Today

Agencies Offer Advice on Minimizing Attack Surface In a bid to address security risks associated with the use of virtual private network solutions, the National Security Agency and the Cybersecurity and Infrastructure Security Agency on Tuesday offered government leaders guidance on selecting remote access VPNs and strengthening their security.

Security 268
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Expert discloses new iPhone lock screen vulnerability in iOS 15

Security Affairs

The security researcher Jose Rodriguez discovered a new lock screen vulnerability for iOS 15 (& iOS 14.8) that has yet to be fixed. The security researcher Jose Rodriguez ( @VBarraquito ) discovered a new lock screen vulnerability for iOS 15 (& iOS 14.8) that has yet to be addressed by Apple. A threat actor with physical access to a vulnerable device can access Notes via Siri/Voice Over.

Access 131
article thumbnail

Top Russian Cybersecurity CEO Charged with Treason

Data Breach Today

Group-IB's Ilya Sachkov Arrested on Treason Charges; Cybersecurity Leaders Speak Out The founder of Group-IB, one of Russia's largest cybersecurity companies, has been detained on state treason charges and will be held in custody for two months, with alleged crimes punishable by up to 20 years in prison, according to wire reports.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

NSA, CISA release guidance on hardening remote access via VPN solutions

Security Affairs

The U.S. CISA and the NSA agencies have published guidance for securely using virtual private network (VPN) solutions. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) have released guidance for increasing the security of virtual private network (VPN) solutions. Multiple attacks against private organizations and government entities, especially during the pandemic, were carried out by threat actors by exploiting vulnerabilities in popular VPN

Access 127

More Trending

article thumbnail

GriftHorse malware infected more than 10 million Android phones from 70 countries

Security Affairs

Security researchers uncovered a massive malware operation, dubbed GriftHorse, that has already infected more than 10 million Android devices worldwide. Security researchers from Zimperium have uncovered a piece of malware, dubbed GriftHorse, that has infected more than 10 million Android smartphones across more than 70 countries. According to the experts, the malware campaign has been active since at least November 2020, threat actors are spreading via apparently harmless apps that were uploade

Phishing 113
article thumbnail

Mental Health Clinic Notifies Patients 6 Months After Hack

Data Breach Today

PII, PHI for 35,000 Individuals Potentially Stolen in Incident A Philadelphia-based mental health services provider has begun to notify tens of thousands of individuals that their health and personal information was potentially viewed or stolen by hackers in a data security incident discovered more than six months ago.

Security 144
article thumbnail

The green mining technology leap in northern Sweden

CGI

Recently, HYBRIT, a Swedish green steel venture announced the delivery of the world’s first fossil-free steel or “green steel” to carmaker, Volvo. A few weeks later, Mercedes-Benz also announced their plans to use green steel. A remarkable achievement on all accounts and an optimistic nod for the future. This has been made possible due to a strong history of innovation in Sweden.

Mining 98
article thumbnail

Experts Slam Social Media Platforms' Data Policies

Data Breach Today

Hearing: Researchers Liken Major Platforms to a 'Disinformation Black Box' Cybersecurity and computer science experts testifying before Congress on Tuesday expressed concerns about their inability to access key social media data sets that could allow them to analyze and potentially counter the spread of misinformation.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Apple AirTag Zero-Day Weaponizes Trackers

Threatpost

Apple's personal item-tracker devices can be used to deliver malware, slurp credentials, steal tokens and more thanks to XSS.

IoT 117
article thumbnail

DXC supports digital literacy with Iberia Codes contest

DXC Technology

DXC volunteers in Iberia are making a difference in the lives of children by promoting digital literacy via a coding contest. This fun and collaborative initiative to awaken and foster children’s interest in and passion for technology helps them develop and hone their computational thinking skills using a STEM approach. 2021 marked the sixth year […].

article thumbnail

SAS 2021: ‘Tomiris’ Backdoor Linked to SolarWinds Malware

Threatpost

Newly discovered code resembles the Kazuar backdoor and the Sunshuttle second-stage malware distributed by Nobelium in the SolarWinds supply-chain attacks.

Cloud 104
article thumbnail

Why Should I Care About HTTP Request Smuggling?

Dark Reading

HTTP request smuggling is a growing vulnerability, but you can manage the risk with proper server configuration.

Risk 119
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Facebook released Mariana Trench tool to find flaws in Android and Java apps

Security Affairs

Facebook released Mariana Trench, an internal open-source tool that can be used to identify vulnerabilities in Android and Java applications. The Facebook security team has open-sourced the code for Mariana Trench , an internal open-source tool used by the company experts to identify vulnerabilities in Android and Java applications. The name comes from the Mariana Trench, the deepest oceanic trench on Earth located in the western Pacific Ocean.

article thumbnail

Alice in Windowsland: 3 ways to escalate privileges and steal credentials

Outpost24

Alice in Windowsland: 3 ways to escalate privileges and steal credentials. 01.Oct.2021. Florian Barre. Wed, 09/29/2021 - 09:33. Liatsis Fotios, Senior Security Consultant. Ghost Labs. Teaser. Read how our red team used different attack techniques to hack AppLocker restrictions by implementing escalated privileges and reusing the Credentials Manager to extract stored data and Azure information.

article thumbnail

Why James Bond Doesn’t Use an iPhone

WIRED Threat Level

The fictional superspy wields Nokia devices in 'No Time To Die.' It’s an odd choice, but Apple's smartphones aren’t ideal, either.

Security 104
article thumbnail

Conti Ransomware Expands Ability to Blow Up Backups

Threatpost

The Conti ransomware gang has developed novel tactics to demolish backups, especially the Veeam recovery software.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Shades of SolarWinds Attack Malware Found in New 'Tomiris' Backdoor

Dark Reading

Malware contains similarities that suggest a possible link to malware that Russia's DarkHalo group used in its massive supply chain attack, researchers say.

IT 91
article thumbnail

Group-IB CEO was put under arrest on treason charges

Security Affairs

Russian media reported that the police made searches in the Moscow office of security firm Group-IB apparently linked to an investigation into a criminal case. The police made searches in the Moscow office of the threat intelligence firm Group-IB, according to the media local authorities are investigating a criminal case. According to RTVI, the police arrested Ilya Sachkov, CEO of Group-IB, on the morning of September 28.

article thumbnail

Hundreds of Scam Apps Hit Over 10 Million Android Devices

WIRED Threat Level

The so-called GriftHorse campaign used clever techniques to avoid detection in Google Play for nearly a year.

article thumbnail

WhatsApp (a Facebook) company, plans to appeal Irish Data Protection Commission €225m fine via the BBC

IG Guru

Read more about the story here. The post WhatsApp (a Facebook) company, plans to appeal Irish Data Protection Commission €225m fine via the BBC appeared first on IG GURU.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

3 Security Initiatives AWS's New CEO Should Prioritize

Dark Reading

As Adam Selipsky takes the helm at Amazon Web Services, security must be one of the first things he addresses. Here are three initiatives that should take priority.

article thumbnail

Keep Attackers Out of VPNs: Feds Offer Guidance

Threatpost

The NSA and CISA issued recommendations on choosing and hardening VPNs to prevent nation-state APTs from weaponizing flaws & CVEs to break into protected networks.

article thumbnail

50% of Servers Have Weak Security Long After Patches Are Released

Dark Reading

Many servers remain vulnerable to high-severity flaws in Microsoft Exchange Server, VMware vCenter, Oracle WebLogic, and other popular products and services.

article thumbnail

Who benefits from connected engineering?

OpenText Information Management

Producing even the simplest industrial part or piece of equipment requires the work of a lot of people. And many of the things that industrial and manufacturing businesses make today are anything but simple. A host of other market challenges complicates the picture even further: increasingly complex designs, the possibility of using additive manufacturing (3D … The post Who benefits from connected engineering?

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

DAST to the Future: Shifting the Modern AppSec Paradigm

Dark Reading

NTT Application Security's Modern AppSec Framework takes a DAST-first approach to defend applications where breaches happen — in production.

article thumbnail

Ethical supply chains to deliver key competitive advantage in post-pandemic commerce

OpenText Information Management

Before the pandemic, many consumers showed a growing preference for ethical and environmentally friendly products, driving increased demand for responsibly sourced goods over the past decade or so. But as global lockdowns forced an increase in online shopping, consumers also became significantly more aware of their waste, carbon, and social footprint.

IoT 63
article thumbnail

Keep Attackers Out of VPNs: Feds Offer Guidance

Threatpost

The NSA and CISA issued guidance on choosing and hardening VPNs to prevent nation-state APTs from weaponizing flaws & CVEs to break into protected networks.