FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdaySecurity

Malicious deepfakes used in attacks up 13% from last year, VMware finds

Plus: Crooks swimming around your network, looking for a way in, says Incident Response Threat Report

Security teams are facing down more cyberattacks following Russia's invasion of Ukraine, and sophisticated crooks are using double-extortion techniques and, increasingly, deepfakes in their strikes.…

  • August 9th 2022 at 15:11

Don't Take the Cyber Safety Review Board's Log4j Report at Face Value

By Matt Chiodi, Chief Trust Officer, Cerby
Given the lack of reporting requirements, the findings are more like assumptions. Here's what organizations can do to minimize exposure.

  • August 9th 2022 at 14:50

Twilio Suffers Data Breach After Employees Fall Victim to SMS Phishing Attack

By Ravie Lakshmanan
Customer engagement platform Twilio on Monday disclosed that a "sophisticated" threat actor gained "unauthorized access" using an SMS-based phishing campaign aimed at its staff to gain information on a "limited number" of accounts. The social-engineering attack was bent on stealing employee credentials, the company said, calling the as-yet-unidentified adversary "well-organized" and "methodical

Human Threat Hunters Are Essential to Thwarting Zero-Day Attacks

By A.N. Ananth, President, Netsurion
Machine-learning algorithms alone may miss signs of a successful attack on your organization.

  • August 9th 2022 at 14:00

Will Europe Force a Facebook Blackout?

By Matt Burgess
Regulators are close to stopping Meta from sending EU data to the US, bringing a years-long privacy battle to a head.

Microsoft's fix for 'data damage' risk hits PC performance

'AES-based operations might be two times slower' without latest updates

Microsoft has warned that Windows devices with the newest supported processors might be susceptible to data damage, noting the initial fix might have slowed operations down for some.…

  • August 9th 2022 at 13:30

How to check if your PC has been hacked – and what to do next

By Phil Muncaster

Has your PC been hacked? Whatever happens, don’t panic. Read on for ten signs your PC has been hacked and handy tips on how to fix it.

The post How to check if your PC has been hacked – and what to do next appeared first on WeLiveSecurity

U.S. Sanctions Virtual Currency Mixer Tornado Cash for Alleged Use in Laundering

By Ravie Lakshmanan
The U.S. Treasury Department on Monday placed sanctions against crypto mixing service Tornado Cash, citing its use by the North Korea-backed Lazarus Group in the high-profile hacks of Ethereum bridges to launder and cash out the ill-gotten money. Tornado Cash, which allows users to move cryptocurrency assets between accounts by obfuscating their origin and destination, is estimated to have been

The Truth About False Positives in Security

By The Hacker News
TL;DR: As weird as it might sound, seeing a few false positives reported by a security scanner is probably a good sign and certainly better than seeing none. Let's explain why. Introduction False positives have made a somewhat unexpected appearance in our lives in recent years. I am, of course, referring to the COVID-19 pandemic, which required massive testing campaigns in order to control the

10 Credential Stealing Python Libraries Found on PyPI Repository

By Ravie Lakshmanan
In what's yet another instance of malicious packages creeping into public code repositories, 10 modules have been removed from the Python Package Index (PyPI) for their ability to harvest critical data points such as passwords and API tokens. The packages "install info-stealers that enable attackers to steal developer's private data and personal credentials," Israeli cybersecurity firm Check

Chinese Hackers Targeted Dozens of Industrial Enterprises and Public Institutions

By Ravie Lakshmanan
Over a dozen military-industrial complex enterprises and public institutions in Afghanistan and Europe have come under a wave of targeted attacks since January 2022 to steal confidential data by simultaneously making use of six different backdoors. Russian cybersecurity firm KasperskyΒ attributedΒ the attacks "with a high degree of confidence" to a China-linked threat actor tracked byΒ ProofpointΒ 

Chinese scammers target kids with promise of extra gaming hours

Cyberspace regulator's fraud report finds all is not well behind the Great Firewall

Fraudsters in China have targeted a child with promises of allowing them to get around the nation's time limits on playing computer games – for a mere $560, according to the nation's cyberspace administration. Yesterday the CAC detailed some of the 12,000 acts of online fraud perpetrated against minors it handled this year.…

  • August 9th 2022 at 02:45

China-linked spies used six backdoors to steal info from defense, industrial enterprise orgs

We're 'highly likely' to see similar attacks, Kaspersky warned

Beijing-backed cyberspies used specially crafted phishing emails and six different backdoors to break into and then steal confidential data from military and industrial groups, government agencies and other public institutions, according to Kaspersky researchers.…

  • August 9th 2022 at 00:23

GitHub Moves to Guard Open Source Against Supply Chain Attacks

By Lily Hay Newman
The popular Microsoft-owned code repository plans to roll out code signing, which will help beef up the security of open source projects.

US treasury whips up sanctions for crypto mixer Tornado Cash

Being the money launderer for North Korea’s Lazarus Group comes at a price

The US Treasury Department is levying sanctions against Tornado Cash, a notorious cryptocurrency mixer that it says has been used by threat groups like ransomware gang Lazarus to launder stolen digital assets.…

  • August 8th 2022 at 23:00

10 Malicious Code Packages Slither into PyPI Registry

By Jai Vijayan, Contributing Writer, Dark Reading
The discovery adds to the growing list of recent incidents where threat actors have used public code repositories to distribute malware in software supply chain attacks.

  • August 8th 2022 at 19:00

Twilio customer data exposed after its staffers got phished

Comms giant says several other firms targeted in 'sophisticated attack'

Twilio confirmed a breach of the communication giant's network and accessed "a limited number" of customer accounts after tricking some employees into falling for a phishing attack.…

  • August 8th 2022 at 17:45

Dark Reading News Desk: Live at Black Hat USA 2022

By Dark Reading Staff, Dark Reading
TODAY at 10 PT: Dark Reading News Desk returns to Black Hat USA 2022

  • August 11th 2022 at 13:00

A Phone Carrier That Doesn’t Track Your Browsing or Location

By Lily Hay Newman
The new Pretty Good Phone Privacy service for Android hides the data linking you to your mobile device.

Microsoft tightens Edge security for less visited websites

We're pretty sure that doesn't mean it's safe to click on sketchy popups

Microsoft wants to make it safer for Edge users to browse and visit unfamiliar websites by automatically applying stronger security settings.…

  • August 8th 2022 at 17:15

Deepfakes Grow in Sophistication, Cyberattacks Rise Following Ukraine War

By Nathan Eddy, Contributing Writer, Dark Reading
A rising tide of threats β€” from API exploits to deepfakes to extortionary ransomware attacks β€” is threatening to overwhelm IT security teams.

  • August 8th 2022 at 15:28

Phishers Swim Around 2FA in Coinbase Account Heists

By Elizabeth Montalbano
Attackers are spoofing the widely used cryptocurrency exchange to trick users into logging in so they can steal their credentials and eventually their funds.

Slack admits to leaking hashed passwords for five years

By Paul Ducklin
"When those invitations went out... somehow, your password hash went out with them."

HYAS Infosec Announces General Availability of Cybersecurity Solution for Production Environments

HYAS Confront provides total visibility into your production environment, giving you insight into potential issues like cyber threats before they become problems.
  • August 8th 2022 at 14:27

We Have the Tech to Scale Up Open Source Vulnerability Fixes β€” Now It's Time to Leverage It

By Ericka Chickowski, Contributing Writer, Dark Reading
Q&A with Jonathan Leitschuh, inaugural HUMAN Dan Kaminsky Fellow, in advance of his upcoming Black Hat USA presentation.

  • August 8th 2022 at 14:20

What Adjustable Dumbbells Can Teach Us About Risk Management

By Joshua Goldfarb, Fraud Solutions Architect - EMEA and APCJ, F5
A new workout leads to five smart lessons about the importance of converging security and fraud into a unified risk function.

  • August 8th 2022 at 14:07

Pipeline Operators Are Headed in the Right Direction, With or Without TSA's Updated Security Directives

By Duncan Greatwood, CEO, Xage
A worsening threat landscape, increased digitization, and the long-term positive effects of modern security strategies are pushing critical infrastructure operators to do better.

  • August 8th 2022 at 14:00

New Orchard Botnet Uses Bitcoin Founder’s Account Info to Generate Malicious Domains

By Ravie Lakshmanan
A new botnet named Orchard has been observed using Bitcoin creator Satoshi Nakamoto's account transaction information to generate domain names to conceal its command-and-control (C2) infrastructure. "Because of the uncertainty of Bitcoin transactions, this technique is more unpredictable than using the common time-generated [domain generation algorithms], and thus more difficult to defend

The Benefits of Building a Mature and Diverse Blue Team

By The Hacker News
A few days ago, a friend and I were having a rather engaging conversation that sparked my excitement. We were discussing my prospects of becoming a red teamer as a natural career progression. The reason I got stirred up is not that I want to change either my job or my position, as I am a happy camper being part of Cymulate's blue team. What upset me was that my friend could not grasp the idea

Researchers Uncover Classiscam Scam-as-a-Service Operations in Singapore

By Ravie Lakshmanan
A sophisticated scam-as-a-service operation dubbed Classiscam has now infiltrated into Singapore, more than 1.5 years afterΒ expanding to Europe. "Scammers posing as legitimate buyers approach sellers with the request to purchase goods from their listings and the ultimate aim of stealing payment data," Group-IBΒ saidΒ in a report shared with The Hacker News. The cybersecurity firm called the

Slack leaked hashed passwords from its servers for years

Users who created shared invitation links for their workspace had login details slip out among encrypted traffic

Did Slack send you a password reset link last week? The company has admitted to accidentally exposing the hashed passwords of workspace users.…

  • August 8th 2022 at 11:45

Meta Cracks Down on Cyber Espionage Operations in South Asia Abusing Facebook

By Ravie Lakshmanan
Facebook parent company Meta disclosed that it took action against two espionage operations in South Asia that leveraged its social media platforms to distribute malware to potential targets. The first set of activities is what the company described as "persistent and well-resourced" and undertaken by a hacking group tracked under the moniker Bitter APT (aka APT-C-08 or T-APT-17) targeting

Dark Utilities C2 service draws thousands of cyber criminals

Nascent platform provides miscreants an easier and cheaper way to launch remote access, DDoS, and other attacks

A platform that makes it easier for cyber criminals to establish command-and-control (C2) servers has already attracted 3,000 users since launching earlier this year, and will likely expand its client list in the coming months.…

  • August 8th 2022 at 06:31

How to Use Lockdown Mode in iOS 16 to Make Your Phone More Secure

By David Nield
Whether you want to turn off link previews or block unwanted FaceTime calls, here's what you need to know.

New IoT RapperBot Malware Targeting Linux Servers via SSH Brute-Forcing Attack

By Ravie Lakshmanan
A new IoT botnet malware dubbed RapperBot has been observed rapidly evolving its capabilities since it was first discovered in mid-June 2022. "This family borrows heavily from the originalΒ Mirai source code, but what separates it from other IoT malware families is its built-in capability to brute force credentials and gain access to SSH servers instead of Telnet as implemented in Mirai,"

DuckDuckGo says Hell, Hell, No to those Microsoft trackers after web revolt

Plus: That Twitter privacy leak, scammers send Ubers for victims, critical flaw in Cisco gear, and more

In brief DuckDuckGo has finally mostly cracked down on the third-party Microsoft tracking scripts that got the alternative search engine into hot water earlier this year.…

  • August 6th 2022 at 19:41

The US Emergency Alert System Has Dangerous Flaws

By Andrew Couts
Plus: A crypto-heist extravaganza, a peek at an NSO spyware dashboard, and more.

An ISP Settled Piracy Lawsuits. Could Users Take the Hit?

By Jon Brodkin, Ars Technica
Now that Charter has reached settlements with major record labels, it’s unclear whether the cable provider will pull the plug on users who pirate music.

Hackers Exploit Twitter Vulnerability to Exposes 5.4 Million Accounts

By Ravie Lakshmanan
Twitter on Friday revealed that a now-patched zero-day bug was used to link phone numbers and emails to user accounts on the social media platform. "As a result of the vulnerability, if someone submitted an email address or phone number to Twitter's systems, Twitter's systems would tell the person what Twitter account the submitted email addresses or phone number was associated with, if any,"

Slack Resets Passwords After a Bug Exposed Hashed Passwords for Some Users

By Ravie Lakshmanan
Slack said it took the step of resetting passwords for about 0.5% of its users after a flaw exposed salted password hashes when creating or revoking shared invitation links for workspaces. "When a user performed either of these actions, Slack transmitted a hashed version of their password to other workspace members," the enterprise communication and collaboration platformΒ saidΒ in an alert on 4th
❌