A critical authentication bypass vulnerability could be exploited by remote attackers to Rockwell Automation programmable logic controllers (PLCs). A critical authentication bypass vulnerability, tracked as CVE-2021-22681, can be exploited by remote attackers to compromise programmable logic controllers (PLCs) manufactured by Rockwell Automation. The vulnerability was independently reported to Rockwell by researchers at the Soonchunhyang University […]
The post Experts found a critical authentication bypass flaw in Rockwell Automation software appeared first on Security Affairs.
Read More Experts found a critical authentication bypass flaw in Rockwell Automation software
Windows 10 ‘Sun Valley’ UI refresh, otherwise known as ‘version 21H2’, is reportedly arriving in the second half of this year and it will also include several new features. […]
Read More Windows 10 Sun Valley design refresh — here’s what you need to know
‘Hotarus Corp’ Ransomware operators hacked Ecuador’s largest private bank, Banco Pichincha, and the country’s Ministry of Finance. A cybercrime group called ‘Hotarus Corp’ has breached the Ecuador’s largest private bank, Banco Pichincha, and the local Ministry of Finance (the Ministerio de Economía y Finanzas de Ecuador). The group claims to have also stolen data from […]
The post Hotarus Corp gang hacked Ecuador’s Ministry of Finance and Banco Pichincha appeared first on Security Affairs.
Read More Hotarus Corp gang hacked Ecuador’s Ministry of Finance and Banco Pichincha
Critical Networks Within National Security Systems Should Implement Zero TrustThe US National Security Agency has issued its zero trust guidance aimed at securing critical networks and sensitive data within key federal agencies. The NSA adds it is also…
Read More NSA Issues Guidance on Zero Trust Implementation
The National Security Agency (NSA) and Microsoft are advocating for the Zero Trust security model as a more efficient way for enterprises to defend against today’s increasingly sophisticated threats. […]
Read More NSA, Microsoft promote a Zero Trust approach to cybersecurity
Microsoft has fixed a Windows 10 bug that could cause NTFS volumes to become corrupted by merely accessing a particular path or viewing a specially crafted file. […]
Read More Microsoft fixes Windows 10 drive corruption bug — what you need to know
Project Zero, Google’s 0day bug-hunting team, shared technical details and proof-of-concept (PoC) exploit code for a critical remote code execution (RCE) bug affecting a Windows graphics component. […]
Read More Google shares PoC exploit for critical Windows 10 Graphics RCE bug
The telecommunications giant T-Mobile disclosed a data breach after some of its customers were apparently affected by SIM swap attacks. The telecommunications provider T-Mobile has disclosed a data breach after it became aware that some of its customers were allegedly victims of SIM swap attacks. Crooks conduct SIM swapping attacks to take control of victims’ […]
The post T-Mobile customers were hit with SIM swapping attacks appeared first on Security Affairs.
Read More T-Mobile customers were hit with SIM swapping attacks
I honestly don’t know where my time goes. I get up, have great plans for all the things I want to do then next minute, the day is gone. There’s probably some hints in the range of different things I’m speaking about this week and the book is certainly now
Read More Weekly Update 232
The number of attacks had slowed down after the winter holidays, but after the past two weeks, it’s evident that the ransomware attacks are back at full speed. […]
Read More The Week in Ransomware – February 26th 2021 – Back from the Holidays
French experts spotted a new Ryuk ransomware variant that implements self-spreading capabilities to infect other devices on victims’ local networks. Experts from French national cyber-security agency ANSSI have spotted a new Ryuk ransomware variant that implements worm-like capabilities that allow within local networks. “On top of its usual functions, this version holds a new attribute […]
The post New Ryuk ransomware implements self-spreading capabilities appeared first on Security Affairs.
Read More New Ryuk ransomware implements self-spreading capabilities
Lawmakers and Witnesses See Expanded Role for CISA Following AttackA pair of U.S. House committees held their first public hearings into the SolarWinds attack, with lawmakers and witnesses offering support for expanding federal cybersecurity laws to ad…
Read More House SolarWinds Hearing Focuses on Updating Cyber Laws
The Far Side on squid.
Read More Friday Squid Blogging: Far Side Cartoon
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog posting guidelines here.
Hackers are desperately scanning the internet for unpatched VMware servers that contain a dangerous code-execution vulnerability, according to researchers
Read More VMware’s code-execution flaw has a severity rating of 9.8 out of 10
The post VMware’s code-execution flaw has a severity rating of 9.8 out of 10 first appeared on IT…
Cryptocurrency scammers have made at least $145,000 this week by promoting fake giveaways through hacked verified Twitter accounts. […]
Read More Twitter scammers earned over $145k this week in Bitcoin, Ethereum, Doge
Researchers found a number of privacy and security issues in Amazon’s Alexa skill vetting process, which could lead to attackers stealing data or launching phishing attacks.
Read More Amazon Dismisses Claims Alexa ‘Skills’ Can Bypass Security Vetting Process
The benefits of working remotely are numerous, but studies are finding there are significant hidden costs that need to be factored in.
Read More The hidden business costs of working remotely
Even with all the uncertainty in the world, people welcomed the turning of the new year as a fresh start. Cyber-criminals also welcomed 2021 – not as a chance to reflect and reboot but as an opportunity to build on their many successes over the p…
Read More Layers the best cybersecurity approach in 2021
COVID-19 impacted volumes for the year, but the U.S. moved into third place on the list of countries most infected by stalkerware.
Read More Stalkerware Volumes Remain Concerningly High, Despite Bans
Every new presidential administration brings change, one way or another. Learn what President Joseph Biden is facing on the cybersecurity front, along with some tips for government and businesses.
Read More How will cybersecurity change with a new U.S. president? Pros identify the biggest needs
A new document provides guidance for businesses planning to implement a zero-trust system management strategy.
Read More NSA Releases Guidance on Zero-Trust Architecture
Let’s meet one of the diverse new graduates seeking work in the tech space this year. I had the privilege of connecting with Sarah Laframboise, to ask her what motivated her to join this fascinating field. Laframboise is a recent graduate of Calgary’s …
Read More A one-on-one with a recent business technology management program graduate
Some jokes never get old.
Read More ‘Nerd’ Humor
CISA May Launch Other Grants as WellThe U.S. Department of Homeland Security will provide an additional $25 million in grants to state and local cybersecurity preparedness programs with a particular focus on combatting ransomware, Secretary Alejandro M…
Read More DHS to Provide $25 Million More for Cybersecurity Grants
American telecommunications provider T-Mobile has disclosed a data breach after an unknown number of customers were apparently affected by SIM swap attacks. […]
Read More T-Mobile discloses data breach after SIM swapping attacks
On today’s podcast guest analyst Terry Cutler and I discuss whether companies should be forced to report cybersecurity incidents to a government body, and how external scanning of IT networks reveals a lot of information for hackers
Read More Cyber Security Today – Week in Review for February 26, 2021
The post Cyber Secu…
A spear-phishing campaigned linked to a North Korean APT uses “NukeSped” malware in cyberespionage attacks against defense companies.
Read More Lazarus Targets Defense Companies with ThreatNeedle Malware
An unprecedented 2020 has shaken up security leaders’ usual list of must-have technologies for 2021. Where do they plan to spend next?
Read More The Edge Pro Tip: Fasten Your Seatbelts
A hacking group called ‘Hotarus Corp’ has hacked Ecuador’s Ministry of Finance and the country’s largest bank, Banco Pichincha, where they claim to have stolen internal data. […]
Read More Ransomware gang hacks Ecuador’s largest private bank, Ministry of Finance
In a locked-down world, it’s often hard to do some kinds of market research as it should be done. This startup might have a unique solution to that problem.
Read More A startup’s answer to market research in a virtual world
The post A startup’s answer to market research in a virtual world first appeared on IT World Ca…
Use Threat Hunting to Better Spot Attacks in Progress, Security Experts RecommendRansomware continues to sting numerous organizations, and the problem only seems to be getting worse. More than ever, the onus is on potential victims to ensure they have …
Read More Ransomware: Beware of 13 Tactics, Tools and Procedures
The Flaw in Windows Graphics Component Can Enable Web-Based AttacksMicrosoft has patched a critical vulnerability in Windows that can be exploited by tricking users to visit websites that use a malicious font. The flaw was found by Google’s Project Zer…
Read More Microsoft Patches Windows Remote Code Flaw
A peek at open XDR technology, and defense that held up better than the Kansas City Chiefs.
Read More Securing Super Bowl LV
Sneaker bots ready to scoop up the new Yeezy Boost 700 “Sun” shoes to resell at a huge markup.
Read More Yeezy Fans Face Sneaker-Bot Armies for Boost ‘Sun’ Release
With a stalkerware app on your phone, another person can spy on your activities and view your personal information, Kaspersky says.
Read More How stalkerware can threaten your safety and privacy, and how to avoid it
While access to compromised systems has become an increasingly common service, some cybercriminals are going straight to the source: buying code bases and then updating the application with malicious code.
Read More Attackers Turn Struggling Software Projects Into Trojan Horses
A new Ryuk ransomware variant with worm-like capabilities that allow it to spread to other devices on victims’ local networks has been discovered by the French national cyber-security agency while investigating an attack in early 2021. […]
Read More Ryuk ransomware now self-spreads to other Windows LAN devices
Microsoft announced the release of open-source CodeQL queries that it experts used during its investigation into the SolarWinds supply-chain attack Microsoft has announced the availability of open-source CodeQL queries that the IT giant used during its investigation into the SolarWinds attack. In early 2021, the US agencies FBI, CISA, ODNI, and the NSA released a joint […]
The post Microsoft releases open-source CodeQL queries to assess Solorigate compromise appeared first on Security Affairs.
Read More Microsoft releases open-source CodeQL queries to assess Solorigate compromise
Others Now Can Use CodeQL Queries Available in GitHub RepositoryMicrosoft is making available the CodeQL queries it used to detect malicious implants in the massive supply chain attack that affected SolarWinds, tech firms and government agencies.
Read More Microsoft Releases Queries for SolarWinds Attack Detection
Apple Maps is essential to future innovation, from autonomous vehicles to AR experiences, so it’s noteworthy that Apple’s own Indoor Mapping Data Format (IMDF) has been adopted as a community standard for indoor positioning services.What is IMDF?
Read More Apple’s indoor maps format is now a standard; here’s why that matters
USA had third-highest number of malicious surveillance software victims in 2020
Read More USA Third Most Affected by Stalkerware
Global cybersecurity company completes acquisitions of In Fidem and Motiv
Read More Atos Acquires Two Cybersecurity Companies
Ransomware accounted for nearly 60 per cent of attacks on IBM customers in Canada
Read More Ransomware the top attack type in Canada last year: IBM report
The post Ransomware the top attack type in Canada last year: IBM report first appeared on IT World Canada.
From TrickBot to Ryuk, more malware cybercriminal groups are putting their heads together when attacking businesses.
Read More Malware Gangs Partner Up in Double-Punch Security Threat
Saginaw Township Community Schools targeted in ransomware attack
Read More FBI Investigating Michigan School District Hack
Tracking IT assets using IT asset management software can be vital for the operational and financial success of your organization. For this reason, having an effective IT asset lifecycle management (ITALM) process in place is crucial. But how exactly d…
Read More Understanding IT Asset Lifecycle Management
Privacy bug in Brave browser – Clubhouse audio streamed to external website – Protecting children from cyberbullying in COVID-19 era
Read More Week in security with Tony Anscombe
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Neither clinical research into the coronavirus nor any patient data were affected by the incident
Read More Oxford University COVID‑19 lab hacked
The post Oxford University COVID‑19 lab hacked appeared first on WeLiveSecurity
Several Tibetan organizations were targeted in a cyber-espionage campaign by a state-backed hacking group using a malicious Firefox extension designed to hijack Gmail accounts and infect victims with malware. […]
Read More Malicious Firefox extension allowed hackers to hijack Gmail accounts
Cyber-champions recognized by the Scottish Business Resilience Center
Read More Winners of Inaugural SBRC Cyber Community Awards Announced
Read More PCI DSS v4.0 Timeline Updated to Support an Additional RFC
Industry feedback is fundamental to the evolution of the PCI Data Security Standard (PCI DSS). Because of the broad impact PCI DSS has on the payment community, the Council is seeking additional feedback into the PCI DSS v4.0 valida…
Whether we are technology geeks or not, probably most of us have at least one email address that we use regularly. What some of us may not know yet is that many dangers can come from email compromise – especially if we’re talking about business e…
Read More The Hidden Dangers in Your Company’s Email: What Is Email Compromise
Data Breach: WizCase team uncovered a massive data leak containing private information about Turkish Citizens through a misconfigured Amazon S3 bucket. The server contained 55,000 court papers regarding over 15,000 legal cases, which affected hundreds of thousands of people. What’s Going On? Our online security team has uncovered a massive data breach originating from a misconfigured […]
The post Data Breach: Turkish legal advising company exposed over 15,000 clients appeared first on Security Affairs.
Read More Data Breach: Turkish legal advising company exposed over 15,000 clients
Cybersecurity agencies across five countries have issued a global alert to organizations using the Accellion FTA file transfer application after a number of organizations in the past six weeks admitted to being hacked through vulnerabilities in the sof…
Read More Five nations issue global alert on vulnerabilities in Accellion FTA application
I have always found it curious which tech tools organizations use to get their work done daily. I’m thinking it’s probably not a brief list. Every now and then, it happens I realize a tool I’ve forgotten about is way more adequate for a task than the t…
Read More What is an IT Asset Management Tool?
Whenever I think about SAM and software assets, I remember my very first CND lesson – forget about scharfes-ing the word “asset” because it has nothing in common with what you’re up against in IT management. Instead, replace “s” with the dollar sign (“…
Read More Software Asset Management (SAM) Revisited – ITAM vs SAM and the Real Cost of High-Velocity Upscaling
As screen time has increased, so has the risk of cyberbullying. What you can do to help protect your children from online harassment?
Read More Safeguarding children against cyberbullying in the age of COVID‑19
The post Safeguarding children against cyberbullying in the age of COVID‑19 appeared first on WeLiveSecurity
NWO is the National Research Council of the Netherlands who is in charge of offering funds to thousands of top researchers at Universities and Institutes, thus promoting quality and innovation in science. They are directing an approximate budget of 1 b…
Read More Dutch Research Council Goes Offline After a Ransomware Attack
Researchers said they saw a seven-times increase in ransomware activity in the fourth quarter of 2020, across various families – from Ryuk to Egregor.
Read More Podcast: Ransomware Attacks Exploded in Q4 2020
Retailers that lacked significant digital presence pre-COVID are now reaching new audiences through e-commerce sites that are accessible anytime, from anywhere, on any device.
Read More Protecting Sensitive Cardholder Data in Today’s Hyper-Connected World
You know how the old saying goes. Modern problems require modern solutions. As cyber attackers become shrewder in taking advance of the available technology, the need for robust cybersecurity solutions increases. Here is where XDR comes in. But what is…
Read More What is XDR? Considering Its Features, Benefits, and Beyond
Companies will collaborate to help close the cyber-skills gap through cybersecurity training
Read More Learning Tree International Named First (ISC)² Global Premier Partner
Like many of my peers during the pandemic, I’ve been living off a Logitech Brio camera, which was considered the best in the market until recently. The problem is that Logitech didn’t seem to understand how important this camera had become and refu…
Read More The Poly Studio P15: Searching for a better home videoconferencing answer
This morning’s podcast reports on two studies of cyber threat trends, and a warning about targeted attacks on the defence sector
Read More Cyber Security Today, Feb. 26, 2021 – Conflicting reports on vulnerabilities, and a warning to the defence sector
The post Cyber Security Today, Feb. 26, 2021 – Conflicting reports on vulnerabilities, and a warning to the defence sector …
Excellent Brookings paper: “Why data ownership is the wrong approach to protecting privacy.”
From the introduction:
Read More The Problem with Treating Data as a Commodity
Treating data like it is property fails to recognize either the value that varieties of personal information serve or the abiding interest that individuals have in their personal information even if they choose to “sell” it. Data is not a commodity. It is information. Any system of information rights — whether patents, copyrights, and other intellectual property, or privacy rights — presents some tension with strong interest in the free flow of information that is reflected by the First Amendment. Our personal information is in demand precisely because it has value to others and to society across a myriad of uses…
Hackers have broken into the biochemical systems of an Oxford University lab where researchers are working on the study of Covid-19. Hackers compromised the systems at one of the most advanced biology labs at the Oxford University that is involved in the research on the Covid-19 pandemic. The news was disclosed by Forbes and the […]
The post Hackers are selling access to Biochemical systems at Oxford University Lab appeared first on Security Affairs.
Read More Hackers are selling access to Biochemical systems at Oxford University Lab
UK energy firm Npower has scrapped its smartphone app following an attack by hackers that saw some users’ accounts accessed and personal information stolen.
Read More Npower scraps app, and urges customers to change passwords, after data breach
A prolific North Korean state-sponsored hacking group has been tied to a new ongoing espionage campaign aimed at exfiltrating sensitive information from organizations in the defense industry.
Read More North Korean Hackers Targeting Defense Firms with ThreatNeedle Malware
Attributing the attacks with high confidence to the Lazarus …
The latest Insider Pro and Computerworld Salary Survey reveals the current salaries for dozens of tech titles, the IT skills most in demand (and those not), the tech hiring expectations for the coming year, and what matters most to IT pros in their cur…
Read More IT Salary Survey 2021: The results are in
I’ve been saying for ages now that Google’s Chrome OS would become Microsoft’s Windows top competitor. I had the timing wrong, but my prediction that “most of us will be moving to cloud-oriented operating systems” is finally coming true. According to I…
Read More Forget macOS — it’s Chrome OS vs. Windows for desktop domination
A snapshot of some of the ways ESET makes an impact supporting the well-being of people, communities and the environment
Read More Championing worthy causes: How ESET gives a helping hand
The post Championing worthy causes: How ESET gives a helping hand appeared first on WeLiveSecurity
Article by Greg Foss, Senior Cyber Security Strategist, VMware Carbon BlackWherever there is disruption, cybercriminals see opportunity. Alongside the devastating health and economic impacts of the global coronavirus pandemic, we have also seen a huge …
Read More The Ransomware Group Tactics which Maximise their Profitability
After having a busy 2020, it seems that 2021 is going to be at least as equally productive for the North Korean Lazarus group. Considered one of the most dangerous hacking groups at the moment, they have targeted the defense industry with malware dubbe…
Read More The Lazarus Group Used Custom Malware to Target Defense Industry
We check in on ITWC’s latest MapleSEC satellite series event, the Supreme Court of Canada says no to big telcos’ cries for a pricing appeal, and President Biden signs another exec order, this one tackling the global chip shortage.
Read More Hashtag Trending, Feb. 26, 2021 – MapleSEC recap; Supreme Court of Canada says no to pricing appeal; Biden signs exec order to address chip shortage
The post Hashtag Tren…
Birch joins Kim Cameron as honorary president of the EEMA
Read More David Birch Appointed Honorary President of EEMA
The latest edition of the ISMG Security Report features an analysis of a federal crackdown on ICO cryptocurrency scams. Also featured: An update on the SonicWall hack investigation and the use of digital IDs to verify COVID-19 testing.
Read More Analysis: Feds Crack Down on Cryptocurrency Scams
Dutch Research Council (NWO) confirmed that the recent cyberattack that forced it to take its servers offline was caused by the DoppelPaymer ransomware gang. On February 14, Dutch Research Council (NWO) was hit by a cyber attack that compromised its network and impacted its operations. In response to the incident, the Dutch Research Council (NWO) […]
The post Dutch Research Council (NWO) confirms DoppelPaymer ransomware attack appeared first on Security Affairs.
Read More Dutch Research Council (NWO) confirms DoppelPaymer ransomware attack
Researchers have uncovered gaps in Amazon’s skill vetting process for the Alexa voice assistant ecosystem that could allow a malicious actor to publish a deceptive skill under any arbitrary developer name and even make backend code changes after approv…
Read More ALERT: Malicious Amazon Alexa Skills Can Easily Bypass Vetting Process
Cisco has addressed a maximum severity vulnerability in its Application Centric Infrastructure (ACI) Multi-Site Orchestrator (MSO) that could allow an unauthenticated, remote attacker to bypass authentication on vulnerable devices.
Read More Cisco Releases Security Patches for Critical Flaws Affecting its Products
“An attacker could e…
SolarWinds announced the APM Integrated Experience for the SolarWinds application performance management (APM) solutions—AppOptics, Loggly, and Pingdom—consolidating access to application performance metrics, traces, logs, and user experience into a co…
Read More SolarWinds APM Integrated Experience delivers a single platform for navigation across the APM portfolio
Balancing data privacy within an organization is no easy task, particularly for data scientists who need quick access to data, and security and governance teams whose job it is to protect it. Too many of our customers have told us they are being inunda…
Read More Closing the data divide: How to create harmony among data scientists and privacy advocates
Business email compromise (BEC) threats are one of the many tried-and-tested tactics cybercriminals use to target their victims. These tend to be brief messages with only a few lines of text but no URLs, attached files or other elements that can be sca…
Read More The rise of non-English language spear phishing emails
There was a massive increase in cyber threats globally year-over-year fueled by both the pandemic and expanding attack surfaces, Skybox Security reveals. Expanding attack surfaces New malware samples nearly doubled: New ransomware samples increased 106…
Read More Massive rise in threats across expanding attack surfaces
Employees working from home on a company-provided computer are demonstrating a clear lack of cybersecurity knowledge through high-risk behavior, according to a report released by Ivanti. Using work passwords for consumer websites The report found that …
Read More One in four people use work passwords for consumer websites
Make sure each of your accounts has a separate, unique password. Can’t remember all of your passwords/passphrases? Consider using a password manager to securely store all of them for you.
Read More Unique Passwords
The application container market is expected to register a CAGR of 29% over the forecast period 2021 to 2026, according to ResearchAndMarkets. Increasing deployments of application container across industries Organizations in the retail and e-commerce …
Read More Application container market to grow steadily by 2026
The healthcare sector is undergoing digitalization and adopts new technologies to improve patient care, offer new services for remote patients and reach operational excellence. The integration of new technologies in the complex healthcare IT infrastruc…
Read More ENISA Releases Guidelines for Cloud Security for Healthcare Services
Dragos releases annual analysis of ICS/OT focused cyber threats, vulnerabilities, assessments, and incident response insights. “In 2020, the industrial community performed amazing feats to keep civilization running under challenging circumstances throu…
Read More ICS threat landscape highlights
DeepCube announced the launch of a new suite of products and services to help drive enterprise adoption of deep learning, at scale, on intelligent edge devices and in data centers. The offerings build on DeepCube’s patented platform, which is the indus…
Read More DeepCube’s suite of products drives enterprise adoption of deep learning
Seagate introduced LyveTM Cloud storage-as-a-service platform, an S3-compatible storage-only cloud. Lyve Cloud enables always-on mass capacity data storage and activation. It is designed as a simple, trusted, and efficient service allowing enterprises …
Read More Seagate LyveTM Cloud SaaS platform enables always-on mass capacity data storage and activation
Hewlett Packard Enterprise (HPE) announced the HPE Open RAN Solution Stack to enable the commercial deployment of Open RAN at scale in global 5G networks. The HPE Open RAN Solution Stack includes HPE’s orchestration and automation software, RAN specifi…
Read More HPE Open RAN Solution Stack enables deployment of Open RAN in 5G networks
SentinelOne externalizes the Singularity XDR Marketplace, an open application ecosystem that unifies prevention, detection, and response data and actions across attack surfaces with a few simple clicks. With the Singularity XDR Marketplace, customers c…
Read More SentinelOne Singularity XDR Marketplace enables enterprises to ingest and action diverse data