Cybercriminals Reportedly Created Blockchain Analytics Tool

Data Breach Today

Researchers Say the Tool Is Designed To Help Gangs Launder Bitcoin Cybercriminals have developed a blockchain analytics tool on the darknet that could help a gang launder illegally obtained bitcoin, and they are actively marketing it, according to the cryptocurrency analytics firm Elliptic.

CISA Releases CHIRP, a Tool to Detect SolarWinds Malicious Activity

Security Affairs

US CISA has released a new tool that allows detecting malicious activity associated with the SolarWinds hackers in compromised on-premises enterprise environments. ” reads the description provided on GitHub for the tool.

Cloud 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Fraudsters Flooding Collaboration Tools With Malware

Data Breach Today

Cisco Talos: Reliance on These Tools Expands Attack Surface The increasing reliance on collaboration tools such as Slack and Discord to support those working remotely during the COVID-19 pandemic has opened up new ways for fraudsters and cybercriminals to bypass security tools and deliver malware, Cisco Talos reports.

Top Code Debugging and Code Security Tools

eSecurity Planet

Code debugging and code security tools exist to find and help developers fix the problems that occur. Such tools typically capture exceptions as they occur and provide diagnostic and contextual data to make resolution easier. How they go about it differs from tool to tool.

Address the Challenges of Siloed Monitoring Tools

Companies frequently experience monitoring tool sprawl. Find out why monitoring tool sprawl occurs, why it’s a problem for businesses, and the positive business impacts of monitoring tool consolidation.

Signal Founder Says Cellebrite's Forensics Tools Flawed

Data Breach Today

Flaws Described by Moxie Marlinspike Raise Questions About Extracted Data's Trustworthiness Law enforcement agencies use forensics tools from Israeli company Cellebrite to gain access to locked mobile devices and extract data.

Productivity Tools May Be Monitoring Workers' Productivity

Data Breach Today

Regulatory and Employee Litigation Risks Face Businesses That Violate Privacy Rules Warning to workers: Your productivity tools may also be tracking your workplace productivity, and your bosses may not even know it.

Chinese Hacking Group 'Cloned' NSA Exploit Tool

Data Breach Today

Researchers: 'Jian' Hacking Tool Targeted Zero-Day Flaw in Windows A Chinese hacking group reportedly "cloned" and deployed a zero-day exploit developed by the NSA's Equation Group before Microsoft patched the Windows flaw being exploited, according to Check Point Research.

248
248

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

Since the inception of data forensics almost forty years ago, methods for investigating security events have given way to a market of vendors and tools offering digital forensics software (DFS). Best Digital Forensics Software Tools of 2021.

Kaseya Obtains Decryption Tool After REvil Ransomware Hit

Data Breach Today

Software Vendor Said Approximately 60 MSPs and 1,500 Clients Affected by Attack Remote management software vendor Kaseya has obtained a decryption tool for all organizations affected by the massive ransomware attack launched via its software.

A Recruiter’s Guide To Hiring In 2021

With vaccination rates rising, consumers spending more money, and people returning to offices, the job market is going through a period of unprecedented adjustment. As the New York Times observed, “It’s a weird moment for the American economy.” And recruiting professionals are caught in the middle. To make the most of this disruption, you need to understand the economic drivers, develop a strong strategy for unearthing valuable talent, and use the latest tech tools to get the job done. Read this guide to get your recruiting practice ready to thrive in the new normal.

CISA Tool Helps Measure Readiness to Thwart Ransomware

Data Breach Today

Tool Designed to Gauge Whether Organizations Have Adequate Defense, Recovery Measures The U.S. Cybersecurity and Infrastructure Security Agency has released a Ransomware Readiness Assessment audit tool to help organizations size up their ability to defend against and recover from attacks

Siemens Patches 21 Vulnerabilities in 2 Tools

Data Breach Today

Flaws, If Exploited, Could Enable Remote Control, Data Exfiltration Siemens has mitigated 21 vulnerabilities in two of its virtualization software tools that, if exploited, could enable attackers to gain remote control, exfiltrate data or cause systems to crash.

IT 231

Free Tool Helps Hospitals Block Ransomware

Data Breach Today

To help strengthen the healthcare sector's defenses, the Center for Internet Security is offering all U.S. hospitals and healthcare delivery systems a free protection service designed to help block ransomware and other malware, says Ed Mattison, the center's executive vice president

Chinese Attack Tool Gains Gmail Access

Data Breach Today

Campaign Targets Tibetan Organizations Proofpoint reports that Chinese state-sponsored hackers are using a new customized malicious Mozilla Firefox browser extension that facilitates access and control of victims’ Gmail accounts. So far, the hackers are targeting Tibetan organizations

Access 270

How to Overcome the Pain Points of Your CRM

CRM software is a powerful tool when used correctly, yet another obstacle to a sales team’s efficiency when it’s not. Leveraging research and commentary from industry analysts, this eBook explores how your sales team can get back valuable time by overcoming some pain points with your CRM, such as low adoption rates, integrations, and data quality.

Updated Trickbot Deploys Fresh Reconnaissance Tool

Data Breach Today

Report: Botnet Now Capable of Exfiltrating Additional Data From Networks The operators behind the Trickbot malware are deploying a new reconnaissance tool dubbed "Masrv" to exfiltrate additional data from targeted networks, according to a Kryptos Logic report.

219
219

How WastedLocker Evades Anti-Ransomware Tools

Data Breach Today

Sophos Says Malware Designed to Avoid Security Measures WastedLocker, a ransomware strain that reportedly shut down Garmin's operations for several days in July, is designed to avoid security tools within infected devices, according to a technical analysis from Sophos

Additional Hacking Tools Tied to North Korean-Linked Group

Data Breach Today

Cybereason Finds Kimsuky Group Using Fresh Spying Tools, Infrastructure Researchers with Cybereason have uncovered a fresh set of malicious tools tied to a North Korean-linked hacking group called Kimsuky, according to a recent analysis.

257
257

Microsoft Issues Mitigation Tool for an Exchange Server Flaw

Data Breach Today

One-Click Mitigation Tool' Provides Quick Fix for Proxy Logo Exchange Flaw Microsoft has released an interim mitigation tool designed to help smaller organizations take quick action to prevent attacks that exploit the unpatched Proxy Logon flaw in on-premises Microsoft Exchange servers

218
218

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

NSA Releases Guidance on Obsolete Encryption Tools

Data Breach Today

Agency Recommends Replacement of Old TLS and SSL Protocols The U.S. National Security Agency has released guidance on how the Defense Department, other federal agencies and the contractors that support them should replace obsolete encryption protocols that can enable cyber intrusions.

Hackers Use Cloud Monitoring Tool to Install Cryptominers

Data Breach Today

Reports: TeamTNT Using Weave Scope Tool to Target Cloud Platforms TeamTNT, a recently uncovered hacking group, is weaponizing Weave Scope, a legitimate cloud monitoring tool, to help install cryptominers in cloud environments, according to reports from Intezer and Microsoft

Cloud 242

Google COVID-19 Contact-Tracing Tool Exposes Data: Lawsuit

Data Breach Today

Complain Alleges 'Exposure Notification System' Allows Third-Party Access to Personal Info A lawsuit alleges that a security flaw in a Google COVID-19 contact tracing tool is exposing personal and medical information of millions of users to third parties through device system logs.

Access 217

US Warns Nation-State Groups May Exploit Flaw in Zoho Tool

Data Breach Today

s single sign-on and password management tool to patch for a vulnerability that nation-state groups may look to exploit. FBI, CISA, Coast Guard Release Joint Warning and Urge Customers to Patch CISA, the FBI and the U.S. Coast Guard Cyber Command warn users of Zoho Corp.'s

Catch Them If You Can: The Passive Candidates Edition

With the right tools and mindset, it’s possible to track down this candidate (and many others like them!). How? Simple: By thinking like one. To get started on your search, we’ve gathered clues you’ll need to get in the mind of your passive prospects.

Best Network Security Tools 2021

eSecurity Planet

Top network security tools. MCAS integrates smoothly for organizations leaning on Microsoft software tools. Whether it’s consumers or staff, Okta specializes in tools and APIs that optimize security while providing access to clients.

Cloud 72

Best Vulnerability Scanner Tools

eSecurity Planet

Vulnerability scanning tools can make that process easier by finding and even patching vulnerabilities for you, reducing burden on security staff and operations centers. Best vulnerability scanning tools. Tenable Nessus is a widely used, open source vulnerability assessment tool.

Free Auditing Tool Helps Detect SolarWinds Hackers' Malware

Data Breach Today

FireEye Also Describes Hackers' Tools and Techniques Security firm FireEye has released a free auditing and remediation tool on GitHub that it says can help organizations determine if the hacking group that targeted SolarWinds used similar techniques within their network to gain access to Microsoft Office 365 accounts.

Access 211

EU Launches Decryption Tool for Law Enforcement

Data Breach Today

Move Seen as Alternative to Weakening Encryption Europol, the European Union's law enforcement agency, and the European Commission are launching a new decryption platform to help law enforcement agencies decrypt data that has been obtained as part of a criminal investigation, a move seen as an alternative to weakening encryption.

Reaching Unreachable Candidates

Speaker: Patrick Dempsey and Andrew Erpelding of ZoomInfo

What is ZoomInfo for Recruiters? Find and connect with the right talent to fill roles fast with more data, basic search, advanced search, candidate and company profiles, and export results. Watch this On-Demand Webinar today to see how ZoomInfo for Recruiters can work to get your talented candidates results.

Additional Hacking Tools Tied to North Korea-Linked Group

Data Breach Today

Kimsuky Group Employs Fresh Spying Tools, Infrastructure, Cybereason Reports Researchers with Cybereason have uncovered a fresh set of malicious tools tied to a North Korean-linked hacking group called Kimsuky, according to a recent analysis.

220
220

Was JetBrains Tool an Infection Vector for SolarWinds Hack?

Data Breach Today

JetBrains CEO Says Investigators Have Not Contacted Company Reacting to reports claiming hackers may have used JetBrains' TeamCity tool as an initial infection vector during the attack against SolarWinds, JetBrains CEO Maxim Shafirov says the company has not been contacted by investigators.

218
218

Gamaredon Group Using Fresh Tools to Target Outlook

Data Breach Today

Suspected Russia-Linked Hackers Have Previously Focused on Ukraine The Gamaredon hacking group is now using a new set of malicious tools to compromise Microsoft Outlook as a way of sending spear-phishing emails to victims' contact lists, according to security firm ESET.

FireEye Says Nation-State Attackers Stole Pen Test Tools

Data Breach Today

Security Vendor Believes No Customer Data Was Exfiltrated FireEye, one of the world's top cybersecurity firms, says in a striking announcement on Tuesday that attackers stole its penetration testing tools and sought information about its government clients.

The Ultimate Marketing Efficiency Checklist

Here are 7 creative ways marketers can work smarter (not harder) - with the resources you already have!

Apple will delay the rollout of new child pornography protection tools

Security Affairs

Apple will delay the introduction of its new child pornography protection tools due to a heated debate raised by privacy advocates. The post Apple will delay the rollout of new child pornography protection tools appeared first on Security Affairs.

AI Security Risk Assessment Tool

Schneier on Security

Microsoft researchers just released an open-source automation tool for security testing AI systems: “ Counterfit.” ” Details on their blog. Uncategorized artificial intelligence automation machine learning risk assessment

Risk 89

EU Adopts New Privacy-Focused Data Sharing Tools

Data Breach Today

Tech Giants Welcome the New Data Transfer Move The European Commission has released two new tools aimed at easing the current legal hurdles associated with data sharing by European Union-based organizations and other businesses operating in the region.

Can Evidence Collected by Cellebrite's Tools Be Trusted?

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of whether courts can trust evidence collected by Cellebrite's mobile device forensic tools.

The Recruiting Crossword Puzzle

Test your recruiter-brain with this crossword puzzle, which reveals the best ways to move forward in your efforts with every answer!