security affairs Twitch provided an update for the recent security breach, the company confirmed that it only had a limited impact on a small number of...
nakedsecurity – How to steal money via Apple Pay using the “Express Transit” feature
naked security by SOPHOS A not-yet-published paper from researchers in the UK has been making media headlines because of its dramatic claims about Apple Pay. Apple-centric...
threatpost – Office 365 Spy Campaign Targets US Military Defense
THREATPOST An Iran-linked group is taking aim at makers of drones and satellites, Persian Gulf ports and maritime shipping companies, among others. A new threat actor,...
nakedsecurity – Serious Security: Let’s Encrypt gets ready to go it alone (in a good way!)
NAKED SECURITY You’ve probably heard of Let’s Encrypt, an organisation that makes it easy and cheap (in fact, free) to get HTTPS certificates for your web servers....
darkreading – 10 Hot Red Team Tools Set to Hit Black Hat Europe
The slate of Arsenal presentations at Black Hat Europe is set to feature lots of low-cost and free goodies for offensive security pros. DARKReading USBsamurai Presenter:...
threatpost – Windows Zero-Day Actively Exploited in Widespread Espionage Campaign
THREATPOST The cyberattacks, linked to a Chinese-speaking APT, deliver the new MysterySnail RAT malware to Windows servers. Researchers have discovered a zero-day exploit for Microsoft Windows...
cisomag – Cyber Incident and Data Breach Management Workflow
Technology can help you orchestrate a strong and defensible data breach response process CISOMAG These days, it’s not a matter of if, but when an organization experiences some kind...
thehackernews – Experts Warn of Unprotected Prometheus Endpoints Exposing Sensitive Information
The Hacjer News A large-scale unauthenticated scraping of publicly available and non-secured endpoints from older versions of Prometheus event monitoring and alerting solution could be leveraged...
cisomag – Web Application Risks You Are Likely to Face
CISOMAG Web application risks can increase the chances of cyberattacks if ignored. Learn of the common web app risks to improve your organization’s web app security...
nakedsecurity – Cybersecurity awareness month: Fight the phish!
NAKED SECURITY It’s the second week of Cybersecurity Awareness Month 2021, and this week’s theme is an alliterative reminder: Fight the Phish! Unfortunately, anti-phishing advice often seems to...
threatpost – Mandating a Zero-Trust Approach for Software Supply Chains
THREATPOST Sounil Yu, CISO at JupiterOne, discusses software bills of materials (SBOMs) and the need for a shift in thinking about securing software supply chains. In...
securityaffairs – Prometheus endpoint unprotected installs could expose sensitive data
Security Affairs Experts discovered several unprotected installs of open source event monitoring solution Prometheus that may expose sensitive data. JFrog researchers have discovered multiple unprotected instances...
cisomag – Market Trends Report: Cloud Forensics in Today’s World
CISOMAG The EC-Council Cyber Research report inferred that there are many challenges associated with multi-tenancy, unknown data location, and hybrid cloud deployment plague cloud forensics as...
thehackernews – CISA Issues Warning On Cyber Threats Targeting Water and Wastewater Systems
The Hacker News The U.S. Cybersecurity Infrastructure and Security Agency (CISA) on Thursday warned of continued ransomware attacks aimed at disrupting water and wastewater facilities (WWS),...
theregister – Microsoft says Azure fended off what might just be the world’s biggest-ever DDoS attack
Much of the 2.4Tbit/sec came from across Asia and targeted a single Euro-customer The Register Microsoft claims its Azure cloud has fended off the largest DDOS...
thehackernews – Windows 10, Linux, iOS, Chrome and Many Others at Hacked Tianfu Cup 2021
Windows 10, iOS 15, Google Chrome, Apple Safari, Microsoft Exchange Server, and Ubuntu 20 were successfully broken into using original, never-before-seen exploits at the Tianfu Cup...
theregister – Ad-blocking browser extension actually adds ads, say Imperva researchers
Oi, Google: how did this get past your review process? And Imperva: why does your web page offer to install software? Security vendor Imperva’s research labs...
cisomag – OpenSea NFT Marketplace Bug Allows Hackers to Steal Crypto Wallets
Critical security vulnerabilities on OpenSea’s platform allows hackers to hijack user accounts and steal entire crypto wallets by sending malicious NFTs. Over the past few weeks,...
nakedsecurity – LANtenna hack spies on your data from across the room! (Sort of)
If you’re a Naked Security Podcast listener (and if you aren’t, please give it a try and subscribe if you like it!), you may remember a humorous remark about ‘sideband’ attacks and...
theregister – WhatsApp’s got your back(ups) with encryption for stored messages
Global messaging giant extends security and privacy to Google Drive and Apple iCloud Facebook’s WhatsApp on Thursday began a global rollout of end-to-end (E2E) encryption for...
CISO2CISO NOTEPAD SERIES – PCI DSS V3 MIND MAP FOR CISOs
PCI DSS v3 AMANHANDIKAR.COM URLs PCI DSS Standard https://www.pcisecuritystandards.org/documents/PCI_DSS_v3.pdf PCI Council https://www.pcisecuritystandards.org/ PCI Compliance Guide http://www.pcicomplianceguide.org/ Focus on PCI http://www.focusonpci.com/ Practical Threat Analysis http://www.ptatechnologies.com PCI DSS...
CISO2CISO NOTEPAD SERIES – PENTESTING MIND MAP FOR CISOs
PENETRATION TESTING MIND MAP by amanhardikar.com Following table gives the URLs of all the vulnerable web applications, operating system installations, old software and war games [hacking]...
csrc – Cybersecurity Framework Profile for Ransomware Risk Management
Announcement This revised draft addresses the public comments provided for the preliminary draft released in June 2021. Ransomware is a type of malware that encrypts an...
zdnet – FBI decision to withhold Kaseya ransomware decryption keys stirs debate
Many security experts defended the FBI’s decision to leave Kaseya victims struggling with ransomware infections for weeks. This week, the Washington Post reported that the FBI had the...
thehackernews – Apple’s New iCloud Private Relay Service Leaks Users’ Real IP Addresses
A new as-yet unpatched weakness in Apple’s iCloud Private Relay feature could be circumvented to leak users’ true IP addresses from iOS devices running the latest...
Infosecurity magazine – LG to Acquire Cybellum
The board of directors at Korean electronics company LG Electronics has approved the acquisition of Israel-based vehicle cybersecurity startup Cybellum. In announcing the deal on Thursday, LG said it would assume...
cisomag – Immutable Backups are Key to Becoming Resilient Against Ransomware: Veeam
Ransomware groups now prioritize seeking and encrypting data in backups to make the recovery process difficult unless the ransom is paid. That’s why it’s important to...
securityweekly – Building a More Secure AppDev Process
Enterprises that integrate security testing into their CI/CD pipeline fix 91.4 percent of new issues, according to a progress report from ShiftLeft. Recent software supply chain attacks...