BlackLotus UEFI bootkit: Myth confirmedThe first in-the-wild UEFI bootkit bypassing UEFI Secure Boot on fully updated UEFI systems is now a reality The post BlackLotus UEFI...
Day: March 4, 2023
MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT
MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTTESET researchers tease apart MQsTTang, a new backdoor used by Mustang Panda, which communicates via...
What does $5,000 buy you on a hacking forum? – Week in security with Tony Anscombe
What does $5,000 buy you on a hacking forum? – Week in security with Tony AnscombeA bootkit that ESET researchers have discovered in the wild is...
How to Tackle the Top SaaS Challenges of 2023
How to Tackle the Top SaaS Challenges of 2023Are you prepared to tackle the top SaaS challenges of 2023? With high-profile data breaches affecting major companies...
National Cybersecurity Strategy | Contrast Security
National Cybersecurity Strategy | Contrast Security Time for the gloves to come off, the U.S. government said on Thursday in a newly aggressive policy on cybersecurity...
Digital Trust Digest: This Week’s Must-Know News
Digital Trust Digest: This Week’s Must-Know NewsThe Digital Trust Digest is a curated overview of the week’s top cybersecurity news. Here's what happened the week of...
Exposing the “PDF Botnet” – An OSINT Analysis
Exposing the "PDF Botnet" – An OSINT Analysis Dear blog readers, I've recently stumbled upon a pretty interesting and worth mentioning malicious software and botnet spam...
Randall Munroe’s XKCD ‘Fanservice’
Randall Munroe’s XKCD ‘Fanservice’ via the comic artistry and dry wit of Randall Munroe, resident at XKCD! Permalink The post Randall Munroe’s XKCD ‘Fanservice’ appeared first...
Cowbell Adds Free Cybersecurity Services for Insurance Policy Holders
Cowbell Adds Free Cybersecurity Services for Insurance Policy Holders Cowbell this week added a free 24/7 managed security service for organizations that take out a cyberinsurance...
Defeating Malvertising-Based Phishing Attacks
Defeating Malvertising-Based Phishing Attacks Malvertising Enters a New Age While Google grapples with the potential threat that ChatGPT poses to its advertising business, cybercriminals are taking...
Digital Trust & Safety Roundup: Costly chargebacks, dynamically fighting ATO, and social media scam risks
Digital Trust & Safety Roundup: Costly chargebacks, dynamically fighting ATO, and social media scam risksExplore the cost of rising chargebacks, strategies for fighting ATO, and how...
SafeBreach Coverage for US-CERT Alert (AA23-061A) – Royal Ransomware
SafeBreach Coverage for US-CERT Alert (AA23-061A) – Royal RansomwareSafeBreach coverage for US-CERT Alert (AA22-335A) - Cuba Ransomware The post SafeBreach Coverage for US-CERT Alert (AA23-061A) –...
GoDaddy admits: Crooks hit us with malware, poisoned customer websites
GoDaddy admits: Crooks hit us with malware, poisoned customer websitesNew report admits that attackers were detected in the network about three months ago, and may have...
Twitter tells users: Pay up if you want to keep using insecure 2FA
Twitter tells users: Pay up if you want to keep using insecure 2FAIronically, Twitter Blue users will be allowed to keep using the very 2FA process...
Coinbase breached by social engineers, employee data stolen
Coinbase breached by social engineers, employee data stolenAnother day, another "sophisticated" attack. This time, the company has handily included some useful advice along with its mea...
S3 Ep123: Crypto company compromise kerfuffle [Audio + Text]
S3 Ep123: Crypto company compromise kerfuffle [Audio + Text]Latest episode - listen now! Top-notch advice for cybersecurity, both at work and at home.Leer másNaked SecurityLatest episode...
NPM JavaScript packages abused to create scambait links in bulk
NPM JavaScript packages abused to create scambait links in bulkFree spins? Bonus game points? Cheap social media followers? What harm could it possibly do if you...
Dutch police arrest three cyberextortion suspects who allegedly earned millions
Dutch police arrest three cyberextortion suspects who allegedly earned millionsEver paid hush money to crooks who broke into your network? Wondered how much you can trust...
SaaS Security under NYDFS with Grip SSCP
SaaS Security under NYDFS with Grip SSCPNYDFS regulations have significant implications for companies using SaaS solutions, Grip enables customers to secure SaaS and identities to comply...
USENIX Security ’22 – Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu – ‘Shuffle-based Private Set Union: Faster and More Secure’
USENIX Security ’22 – Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu – ‘Shuffle-based Private Set Union: Faster and More Secure’Our thanks to USENIX...
Beware rogue 2FA apps in App Store and Google Play – don’t get hacked!
Beware rogue 2FA apps in App Store and Google Play – don’t get hacked!Even in Apple's and Google's "walled gardens", there are plenty of 2FA apps...
LastPass: Keylogger on home PC led to cracked corporate password vault
LastPass: Keylogger on home PC led to cracked corporate password vaultSeems the crooks implanted a keylogger via a vulnerable media app (LastPass politely didn't say which...
Feds warn about right Royal ransomware rampage that runs the gamut of TTPs
Feds warn about right Royal ransomware rampage that runs the gamut of TTPsWondering which cybercrime tools, techniques and procedures to focus on? How about any and...
S3 Ep124: When so-called security apps go rogue [Audio + Text]
S3 Ep124: When so-called security apps go rogue [Audio + Text]Rogue software packages. Rogue "sysadmins". Rogue keyloggers. Rogue authenticators. Rogue ROGUES!Leer másNaked SecurityRogue software packages. Rogue...
National Cybersecurity Strategy | Contrast Security
National Cybersecurity Strategy | Contrast Security Time for the gloves to come off, the U.S. government said on Thursday in a newly aggressive policy on cybersecurity...
SaaS Security under NYDFS with Grip SSCP
SaaS Security under NYDFS with Grip SSCPNYDFS regulations have significant implications for companies using SaaS solutions, Grip enables customers to secure SaaS and identities to comply...
TPM 2.0 Library Vulnerabilities May Affect Billions of IoT Devices
TPM 2.0 Library Vulnerabilities May Affect Billions of IoT DevicesThe disclosed flaws occurred when handling malicious TPM 2.0 commands with encrypted parametersRead MoreThe disclosed flaws occurred...
Cybersecurity: Your Guide to Digital Identity
Cybersecurity: Your Guide to Digital IdentityDigital identity is an extra layer of security needed to protect your organization’s document and workflows. Here’s how it works and...
Does Your Company Have a Dark Data Problem?
Does Your Company Have a Dark Data Problem?By Dannie Combs, SVP and Chief Information Security Officer, Donnelley Financial Solutions (DFIN) Don’t let the name fool you:...
LastPass releases new security incident disclosure and recommendations
LastPass releases new security incident disclosure and recommendationsLastPass attacks began with a hacked employee's home computer. The investigation now reveals the password manager company's data vault...