FreshRSS

🔒
☐ ☆ ✇ WIRED

The Best Personal Safety Devices, Apps, and Wearables (2024)

By Medea Giordano — April 11th 2024 at 14:30
Your smartphone or wearable could help you out in a truly dangerous situation. Here are some options to consider.
☐ ☆ ✇ The Hacker News

Critical Zero-Days in Atera Windows Installers Expose Users to Privilege Escalation Attacks

By THN — July 24th 2023 at 13:01
Zero-day vulnerabilities in Windows Installers for the Atera remote monitoring and management software could act as a springboard to launch privilege escalation attacks. The flaws, discovered by Mandiant on February 28, 2023, have been assigned the identifiers CVE-2023-26077 and CVE-2023-26078, with the issues remediated in versions 1.8.3.7 and 1.8.4.9 released by Atera on April 17, 2023, and
☐ ☆ ✇ The Hacker News

Google Messages Getting Cross-Platform End-to-End Encryption with MLS Protocol

By THN — July 24th 2023 at 12:44
Google has announced that it intends to add support for Message Layer Security (MLS) to its Messages service for Android and open source an implementation of the specification. "Most modern consumer messaging platforms (including Google Messages) support end-to-end encryption, but users today are limited to communicating with contacts who use the same platform," Giles Hogben, privacy engineering
☐ ☆ ✇ The Hacker News

How to Protect Patients and Their Privacy in Your SaaS Apps

By The Hacker News — July 24th 2023 at 12:10
The healthcare industry is under a constant barrage of cyberattacks. It has traditionally been one of the most frequently targeted industries, and things haven’t changed in 2023. The U.S. Government’s Office for Civil Rights reported 145 data breaches in the United States during the first quarter of this year. That follows 707 incidents a year ago, during which over 50 million records were
☐ ☆ ✇ WIRED

TETRA Radio Code Encryption Has a Flaw: A Backdoor

By Kim Zetter — July 24th 2023 at 10:00
A secret encryption cipher baked into radio systems used by critical infrastructure workers, police, and others around the world is finally seeing sunlight. Researchers say it isn’t pretty.
☐ ☆ ✇ The Hacker News

New OpenSSH Vulnerability Exposes Linux Systems to Remote Command Injection

By THN — July 24th 2023 at 09:10
Details have emerged about a now-patched flaw in OpenSSH that could be potentially exploited to run arbitrary commands remotely on compromised hosts under specific conditions. "This vulnerability allows a remote attacker to potentially execute arbitrary commands on vulnerable OpenSSH's forwarded ssh-agent," Saeed Abbasi, manager of vulnerability research at Qualys, said in an analysis last week.
☐ ☆ ✇ The Hacker News

Banking Sector Targeted in Open-Source Software Supply Chain Attacks

By THN — July 24th 2023 at 07:24
Cybersecurity researchers said they have discovered what they say is the first open-source software supply chain attacks specifically targeting the banking sector. "These attacks showcased advanced techniques, including targeting specific components in web assets of the victim bank by attaching malicious functionalities to it," Checkmarx said in a report published last week. "The attackers
☐ ☆ ✇ WeLiveSecurity

What happens if AI is wrong? – Week in security with Tony Anscombe

July 24th 2023 at 05:11
Responses generated by ChatGPT about individual people could be misleading or harmful or spill their personal information. What are the takeaways for you as a ChatGPT user?
☐ ☆ ✇ WeLiveSecurity

8 common work-from-home scams to avoid

July 24th 2023 at 05:11
That ‘employer’ you’re speaking to may in reality be after your personal information, your money or your help with their illegal activities
☐ ☆ ✇ WeLiveSecurity

The good, the bad and the ugly of AI – Week in security with Tony Anscombe

July 24th 2023 at 05:11
The growing use of synthetic media and the difficulties in distinguishing between real and fake content raise a slew of legal and ethical questions
☐ ☆ ✇ The Register - Security

Google Cloud shores up log permissions for builder bot

July 24th 2023 at 04:08

ALSO: Amazon's child-sized COPPA fine, smart tech security labels coming to the US, and this week's critical vulns

Infosec in brief Google Cloud has fixed an issue in which it gave away a little too much info in its audit logs to a service account.…

☐ ☆ ✇ WIRED

China’s Breach of Microsoft Cloud Email May Expose Deeper Problems

By Matt Burgess, Lily Hay Newman — July 22nd 2023 at 13:00
Plus: Microsoft expands access to premium security features, AI child sexual abuse material is on the rise, and Netflix’s password crackdown has its intended effect.
☐ ☆ ✇ The Hacker News

Apple Threatens to Pull iMessage and FaceTime from U.K. Amid Surveillance Demands

By THN — July 22nd 2023 at 05:36
Apple has warned that it would rather stop offering iMessage and FaceTime services in the U.K. than bowing down to government pressure in response to new proposals that seek to expand digital surveillance powers available to state intelligence agencies. The development, first reported by BBC News, makes the iPhone maker the latest to join the chorus of voices protesting against forthcoming
☐ ☆ ✇ The Register - Security

Stolen Microsoft key may have opened up a lot more than US govt email inboxes

July 21st 2023 at 22:58

How does the Azure giant come back from this?

A stolen Microsoft security key may have allowed Beijing-backed spies to break into a lot more than just Outlook and Exchange Online email accounts.…

☐ ☆ ✇ The Register - Security

VirusTotal: We're sorry someone fat-fingered and exposed 5,600 users

July 21st 2023 at 20:58

File under PEBCAK

VirusTotal today issued a mea culpa, saying a blunder earlier this week by one of its staff exposed information belonging to 5,600 customers, including the email addresses of US Cyber Command, FBI, and NSA employees.…

☐ ☆ ✇ Krebs on Security

Few Fortune 100 Firms List Security Pros in Their Executive Ranks

By BrianKrebs — July 21st 2023 at 19:11

Many things have changed since 2018, such as the names of the companies in the Fortune 100 list. But one aspect of that vaunted list that hasn’t shifted much since is that very few of these companies list any security professionals within their top executive ranks.

The next time you receive a breach notification letter that invariably says a company you trusted places a top priority on customer security and privacy, consider this: Only five of the Fortune 100 companies currently list a security professional in the executive leadership pages of their websites. This is largely unchanged from five of the Fortune 100 in 2018, the last time KrebsOnSecurity performed this analysis.

A review of the executives pages published by the 2022 list of Fortune 100 companies found only five — BestBuy, Cigna, Coca-Cola, Disney and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks.

One-third of last year’s Fortune 100 companies included a Chief Technology Officer (CTO) in their executive stables; 40 listed Chief Information Officer (CIO) roles, but just 21 included a Chief Risk Officer (CRO).

As I noted in 2018, this is not to say that 95 percent of the Fortune 100 companies don’t have a CISO or CSO in their employ: A review of LinkedIn suggests that most of them in fact do have people in those roles, and experts say some of the largest multinational companies will have multiple people in these positions.

But it is interesting to note which executive positions the top companies deem worth publishing in their executive leadership pages. For example, 88 percent listed a Director of Human Resources (or “Chief People Officer”), and 37 out of 100 included a Chief Marketing Officer.

Not that these roles are somehow more or less important than that of a CISO/CSO within the organization. Nor is the average pay hugely different among all these roles. Yet, considering how much marketing (think consumer/customer data) and human resources (think employee personal/financial data) are impacted by your average data breach, it’s somewhat remarkable that more companies don’t list their chief security personnel among their top ranks.

One likely explanation as to why a great many companies still don’t include their security leaders within their highest echelons is that these employees do not report directly to the company’s CEO, board of directors, or Chief Risk Officer.

The CSO or CISO position traditionally has reported to an executive in a technical role, such as the CTO or CIO. But workforce experts say placing the CISO/CSO on unequal footing with the organization’s top leaders makes it more likely that cybersecurity and risk concerns will take a backseat to initiatives designed to increase productivity and generally grow the business.

“Separation of duties is a fundamental concept of security, whether we’re talking about cyber threats, employee fraud, or physical theft,” said Tari Schreider, an analyst with Datos Insights. “But that critical separation is violated every day with the CISO or CSO reporting to the heads of technology.”

IANS, an organization geared toward CISOs/CSOs and their teams, surveyed more than 500 organizations last year and found roughly 65 percent of CISOs still report to a technical leader, such as the CTO or CIO: IANS found 46 percent of CISOs reported to a CIO, with 15 percent reporting directly to a CTO.

A survey last year by IANS found 65 percent of CISOs report to a tech function within organizations, such as the CTO or CIO. Image: IANS Research.

Schreider said one big reason many CISOs and CSOs aren’t listed in corporate executive biographies at major companies is that these positions often do not enjoy the same legal and insurance protections afforded to other officers within the company.

Typically, larger companies will purchase a “Directors and Officers” liability policy that covers legal expenses should one of the organization’s top executives find themselves dragged into court over some business failing on the part of their employer. But organizations that do not offer this coverage to their security leaders are unlikely to list those positions in their highest ranks, Schreider said.

“It’s frankly shocking,” Schreider said, upon hearing that only four of the Fortune 100 listed any security personnel in their top executive hierarchies. “If the company isn’t going to give them legal cover, then why give them the responsibility for security? Especially when CISOs and CSOs shouldn’t own the risk, yet the majority of them carry the mantle of responsibility and they tend to be scapegoats” when the organization eventually gets hacked, he said.

Schreider said while Datos Insights focuses mostly on the financial and insurance industries, a recent Datos survey echoes the IANS findings from last year. Datos surveyed 25 of the largest financial institutions by asset size (two of which are no longer in existence), and found just 22 percent of CSOs/CISOs reported to the CEO. A majority — 65 percent — had their CSOs/CISOs reporting to either a CTO or CIO.

“I’ve looked at these types of statistics for years and they’ve never really changed that much,” Schreider said. “The CISO or CSO is in the purview of the technical stack from a management perspective. Right, wrong or indifferent, that’s what’s happening.”

Earlier this year, IT consulting firm Accenture released results from surveying more than 3,000 respondents from 15 industries across 14 countries about their security maturity levels. Accenture found that only about one-third of the organizations they surveyed had enough security maturity under their belts to have integrated security into virtually every aspect of their businesses — and this includes having CISOs or CSOs report to someone in charge of overseeing risk for the business as a whole.

Not surprisingly, Accenture also found that only a third of respondents considered cybersecurity risk “to a great extent” when evaluating overall enterprise risk.

“This highlights there is still some way to go to make cybersecurity a proactive, strategic necessity within the business,” the report concluded.

One way of depicting the different stages of security maturity.

A spreadsheet tracking the prevalence of security leaders on the executive pages of the 2022 Fortune 100 firms is available here.

Update, July 23: Somehow overlooked Disney’s CSO listed on their leadership page. The story copy above has been updated to reflect that.

☐ ☆ ✇ The Hacker News

Azure AD Token Forging Technique in Microsoft Attack Extends Beyond Outlook, Wiz Reports

By THN — July 21st 2023 at 15:14
The recent attack against Microsoft's email infrastructure by a Chinese nation-state actor referred to as Storm-0558 is said to have a broader scope than previously thought. According to cloud security company Wiz, the inactive Microsoft account (MSA) consumer signing key used to forge Azure Active Directory (Azure AD or AAD) tokens to gain illicit access to Outlook Web Access (OWA) and
☐ ☆ ✇ The Hacker News

HotRat: New Variant of AsyncRAT Malware Spreading Through Pirated Software

By THN — July 21st 2023 at 15:05
A new variant of AsyncRAT malware dubbed HotRat is being distributed via free, pirated versions of popular software and utilities such as video games, image and sound editing software, and Microsoft Office. "HotRat malware equips attackers with a wide array of capabilities, such as stealing login credentials, cryptocurrency wallets, screen capturing, keylogging, installing more malware, and
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

dnsReaper now supports subdomain attacks using project discovery and SecurityTrails

By /u/punksecurity_simon — July 21st 2023 at 13:29

Hey all,

I help maintain dnsReaper which is a subdomain takeover tool. It's free, available on GitHub and docker and looks for domains vulnerable to domain takeovers.

Today we've added 2 new integrations!

Project discovery have a massive database of subdomains called CHAOS and you can now query and test domains in dnsReaper.

We've also added SecurityTrails, which also has a huge public subdomain list.

This means that you can just point dnsReaper at a bug bounty domain and let it run. There will be false positives for sure, but we have 61 signatures so hopefully there will be some nice easy findings too.

Our blog post on the new features is here:

https://punksecurity.co.uk/blog/dnsreaper_pd/

Our GitHub is over here:

https://github.com/punk-security/dnsReaper

It's a free tool that we built just to highlight this issue and educate. Please give it a star and share it, we'd appreciate it.

submitted by /u/punksecurity_simon
[link] [comments]
☐ ☆ ✇ WeLiveSecurity

Android GravityRAT goes after WhatsApp backups

July 21st 2023 at 13:29
ESET researchers analyzed an updated version of Android GravityRAT spyware that steals WhatsApp backup files and can receive commands to delete files
☐ ☆ ✇ WeLiveSecurity

ESET APT Activity Report Q4 2022­–Q1 2023

July 21st 2023 at 13:29
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2022 and Q1 2023
☐ ☆ ✇ WeLiveSecurity

Passwords out, passkeys in: are you ready to make the switch?

July 21st 2023 at 13:29
With passkeys poised for prime time, passwords seem passé. What are the main benefits of ditching one in favor of the other?
☐ ☆ ✇ WeLiveSecurity

The danger within: 5 steps you can take to combat insider threats

July 21st 2023 at 13:29
Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your radar?
☐ ☆ ✇ WeLiveSecurity

Hunting down BlackLotus – Week in security with Tony Anscombe

July 21st 2023 at 13:29
Microsoft releases guidance on how organizations can check their systems for the presence of BlackLotus, a powerful threat first analyzed by ESET researchers
☐ ☆ ✇ WeLiveSecurity

What TikTok knows about you – and what you should know about TikTok

July 21st 2023 at 13:29
As TikTok CEO attempts to placate U.S. lawmakers, it’s time for us all to think about the wealth of personal information that TikTok and other social media giants collect about us
☐ ☆ ✇ WeLiveSecurity

How the war in Ukraine has been a catalyst in private-public collaborations

July 21st 2023 at 13:29
As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital
☐ ☆ ✇ WeLiveSecurity

10 signs that scammers have you in their sights

July 21st 2023 at 13:29
Don’t be their next victim – here’s a handy round-up of some the most common signs that should set your alarm bells ringing
☐ ☆ ✇ WeLiveSecurity

The good, the bad and the ugly of AI – Week in security with Tony Anscombe

July 21st 2023 at 13:29
The growing use of synthetic media and difficulties in distinguishing between real and fake content raises a slew of legal and ethical questions
☐ ☆ ✇ WeLiveSecurity

School’s out for summer, but it’s not time to let your cyber guard down

July 21st 2023 at 13:29
The beginning of the summer break is the perfect time for parents to remind their children about the importance of safe online habits
☐ ☆ ✇ WeLiveSecurity

Why you need parental control software – and 5 features to look for

July 21st 2023 at 13:29
Strike a balance between making the internet a safer place for your children and giving them the freedom to explore, learn and socialize
☐ ☆ ✇ WeLiveSecurity

SVB's collapse is a scammer’s dream: Don’t get caught out

July 21st 2023 at 13:29
How cybercriminals can exploit Silicon Valley Bank's downfall for their own ends – and at your expense
☐ ☆ ✇ WeLiveSecurity

APT hackers set a honeytrap to ensnare victims – Week in security with Tony Anscombe

July 21st 2023 at 13:29
A request to move an online conversation to a supposedly more secure platform may not be as well-meaning as it sounds
☐ ☆ ✇ WeLiveSecurity

Staying safe on OnlyFans: The naked truth

July 21st 2023 at 13:29
How content creators and subscribers can embrace the social media platform without (overly) exposing themselves to the potentially toxic brew of NSFW content and privacy threats
☐ ☆ ✇ WeLiveSecurity

Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

July 21st 2023 at 13:29
A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys
☐ ☆ ✇ WeLiveSecurity

Is a RAT stealing your files? – Week in security with Tony Anscombe

July 21st 2023 at 13:29
Could your Android phone be home to a remote access tool (RAT) that steals WhatsApp backups or performs other shenanigans?
☐ ☆ ✇ WeLiveSecurity

Common WhatsApp scams and how to avoid them

July 21st 2023 at 13:29
Here's a roundup of some of the most common tricks that fraudsters use to dupe their victims on WhatsApp – and what you can do to protect yourself against them.
☐ ☆ ✇ WeLiveSecurity

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

July 21st 2023 at 13:29
Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack
☐ ☆ ✇ WeLiveSecurity

ESET Threat Report T3 2022

July 21st 2023 at 13:29
A view of the T3 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
☐ ☆ ✇ WeLiveSecurity

You may not care where you download software from, but malware does

July 21st 2023 at 13:29
Why do people still download files from sketchy places and get compromised as a result?
☐ ☆ ✇ WeLiveSecurity

One year on, how is the war playing out in cyberspace? – Week in security with Tony Anscombe

July 21st 2023 at 13:29
With the conflict in Ukraine passing the one-year mark, have its cyber-war elements turned out as expected?
☐ ☆ ✇ WeLiveSecurity

How an innocuous app morphed into a trojan – Week in security with Tony Anscombe

July 21st 2023 at 13:29
ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool
☐ ☆ ✇ WeLiveSecurity

Confident cybersecurity means fewer headaches for SMBs

July 21st 2023 at 13:29
Small and medium-sized businesses have good reason to be concerned about the loss of data and financial impacts
☐ ☆ ✇ WeLiveSecurity

The real cost of a free lunch – Week in security with Tony Anscombe

July 21st 2023 at 13:29
Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained for
❌