It is no secret that business cannot survive without innovation. To gain competitive advantage, companies must continually develop, introducing new processes, new technologies, new tools. Wholesale digitalization has affected innovation in at least two ways. On the one hand, it has prepared the ground to ease the way show more ...
for the adoption of new ideas. On the other, it has opened the door to new threats by complicating IT infrastructure. Our colleagues investigated enterprise-level attitudes toward innovations: how they are implemented and what hinders the process. To do so, with the help of independent research company Savanta, they interviewed more than 300 employees of large companies in North America, Europe, the Middle East, Latin America, the Commonwealth of Independent States, and the Asia-Pacific region. The survey focused on the people responsible for innovation-related decisions, be they external, affecting clients and end products, or internal, affecting employees and work processes. Judging by the answers, innovations often fall short in the implementation stage. The reasons are many (you’ll find them in the full version of the report), but most often failure is the result of insufficient planning. At the same time, 74% of respondents believe that innovations are bound to fail unless the CISO (chief information security officer) is involved. As you might imagine, we’re most interested in issues pertaining to information security, so we were very interested to learn that the areas of innovation that decision makers consider the most promising also happen to be those they think most threaten corporate data security. In particular, 30% of respondents believe that the introduction of new IoT devices increases the risk of attacks and data leaks, 26% point to artificial intelligence, and 25% name blockchain technology as the threat amplifier. However, our colleagues’ interests went beyond security. They also posed questions about the creation of new job roles connected directly to business development through innovation, as well as pinpointing what can go wrong and how to avoid new problems. You can download the full report here.
One of the digital underground’s most popular stores for peddling stolen credit card information began selling a batch of more than three million new card records this week. KrebsOnSecurity has learned the data was stolen in a lengthy data breach at more than 100 Dickey’s Barbeque Restaurant locations show more ...
around the country. An ad on the popular carding site Joker’s Stash for “BlazingSun,” which fraud experts have traced back to a card breach at Dickey’s BBQ. On Monday, the carding bazaar Joker’s Stash debuted “BlazingSun,” a new batch of more than three million stolen card records, advertising “valid rates” of between 90-100 percent. This is typically an indicator that the breached merchant is either unaware of the compromise or has only just begun responding to it. Multiple companies that track the sale in stolen payment card data say they have confirmed with card-issuing financial institutions that the accounts for sale in the BlazingSun batch have one common theme: All were used at various Dickey’s BBQ locations over the past 13-15 months. KrebsOnSecurity first contacted Dallas-based Dickey’s on Oct. 13. Today, the company shared a statement saying it was aware of a possible payment card security incident at some of its eateries: “We received a report indicating that a payment card security incident may have occurred. We are taking this incident very seriously and immediately initiated our response protocol and an investigation is underway. We are currently focused on determining the locations affected and time frames involved. We are utilizing the experience of third parties who have helped other restaurants address similar issues and also working with the FBI and payment card networks. We understand that payment card network rules generally provide that individuals who timely report unauthorized charges to the bank that issued their card are not responsible for those charges.” The confirmations came from Miami-based Q6 Cyber and Gemini Advisory in New York City. Q6Cyber CEO Eli Dominitz said the breach appears to extend from May 2019 through September 2020. “The financial institutions we’ve been working with have already seen a significant amount of fraud related to these cards,” Dominitz said. Gemini says its data indicated some 156 Dickey’s locations across 30 states likely had payment systems compromised by card-stealing malware, with the highest exposure in California and Arizona. Gemini puts the exposure window between July 2019 and August 2020. “Low-and-slow” aptly describes the card breach at Dickie’s, which persisted for at least 13 months. With the threat from ransomware attacks grabbing all the headlines, it may be tempting to assume plain old credit card thieves have moved on to more lucrative endeavors. Alas, cybercrime bazaars like Joker’s Stash have continued plying their trade, undeterred by a push from the credit card associations to encourage more merchants to install credit card readers that require more secure chip-based payment cards. That’s because there are countless restaurant locations — usually franchise locations of an established eatery chain — that are left to decide for themselves whether and how quickly they should make the upgrades necessary to dip the chip versus swipe the stripe. “Dickey’s operates on a franchise model, which often allows each location to dictate the type of point-of-sale (POS) device and processors that they utilize,” Gemini wrote in a blog post about the incident. “However, given the widespread nature of the breach, the exposure may be linked to a breach of the single central processor, which was leveraged by over a quarter of all Dickey’s locations.” While there have been sporadic reports about criminals compromising chip-based payment systems used by merchants in the U.S., the vast majority of the payment card data for sale in the cybercrime underground is stolen from merchants who are still swiping chip-based cards. This isn’t conjecture; relatively recent data from the stolen card shops themselves bear this out. In July, KrebsOnSecurity wrote about an analysis by researchers at New York University, which looked at patterns surrounding more than 19 million stolen payment cards that were exposed after the hacking of BriansClub, a top competitor to the Joker’s Stash carding shop. The NYU researchers found BriansClub earned close to $104 million in gross revenue from 2015 to early 2019, and listed over 19 million unique card numbers for sale. Around 97% of the inventory was stolen magnetic stripe data, commonly used to produce counterfeit cards for in-person payments. Visa and MasterCard instituted new rules in October 2015 that put retailers on the hook for all of the losses associated with counterfeit card fraud tied to breaches if they haven’t implemented chip-based card readers and enforced the dipping of the chip when a customer presents a chip-based card. Dominitz said he never imagined back in 2015 when he founded Q6Cyber that we would still be seeing so many merchants dealing with magstripe-based data breaches. “Five years ago I did not expect we would be in this position today with card fraud,” he said. “You’d think the industry in general would have made a bigger dent in this underground economy a while ago.” Tired of having your credit card re-issued and updating your payment records at countless e-commerce sites every time some restaurant you frequent has a breach? Here’s a radical idea: Next time you visit an eatery (okay, if that ever happens again post-COVID, etc), ask them if they use chip-based card readers. If not, consider taking your business elsewhere.
Ice Lake adds Intel Total Memory Encryption (Intel TME) to the Intel Xeon Scalable platform, to secure the data accessed from the CPU against hardware attacks by encrypting entire memory of a system.
Attackers created a Magento phishing page that used JavaScript to exfiltrate victims' login credentials. The page hosted what appeared to be a legitimate Magento 1.x login portal.
The $35 million funding round announced today saw participation from Ted Schlein, general partner at Kleiner Parkins, and Saam Motamedi and Asheem Chandna, general partners at Greylock.
This vulnerability resides within the Windows TCP/IP stack that is responsible for handling RA packets. Current exploitation leads to denial of service with the possibility of remote code execution.
The ruling by District Court for Northern District of Georgia represented a setback for election integrity advocates who contend that Georgia’s machines have not been secure enough, and still aren’t.
Twitter suffered from cybersecurity shortfalls that enabled a “simple” hack attributed to a Florida teenager to take over accounts of several public figures in July, according to a new report.
Coronavirus-related email subjects continue to dominate phishing campaigns, remaining the primary threat, with over half of phishing emails containing some information related to COVID-19 pandemic.
The winners of the fifth annual Security Serious Unsung Heroes Awards have been announced. The awards celebrate the people making a difference within the cybersecurity industry.
The DVLA said it submitted 181 breach notifications to the Information Commissioner’s Office (ICO) across 2019-20. By contrast, the Home Office submitted just 25 during the period.
The SolarSys framework, which is mainly active in Brazil, is mainly composed of JavaScript backdoors, mail worms, and multiple spy modules. It uses the DGA algorithm to generate domain names randomly.
Launched last year as the foundation of IBM's open security strategy, Cloud Pak for Security is designed to glean threat information and insights from various sources without having to move data.
The flaw (CVE-2020-5135) is a stack-based buffer overflow in the SonicWall Network Security Appliance (NSA). It could also open the door to remote code execution (RCE), researchers said.
The number of ads on hacking forums selling access to compromised IT networks has tripled in September 2020, compared to the previous month, according to research by KELA.
According to a new Sophos study, after being hit by ransomware, and a third (35%) of victims reported recruiting and retaining skilled IT security professionals as their single biggest challenge.
With both security budgets and talent pools negatively affected by the ongoing pandemic, state and local governments are struggling to cope with the constant wave of cyber threats, as per Deloitte.
Cybercriminal groups are increasingly gravitating towards ransomware, while evolving more and more towards a cooperative cartel model, according to new research from threat intelligence firms.
A spokeswoman for the prosecutors’ office said authorities searched offices and homes linked to the company around Munich and a subsidiary in Romania from October 6 to 8.
The newly formed 16-member Cyber Investigations Advisory Board (CIAB) will provide the Secret Service’s Office of Investigations with outside strategic input for the agency’s investigative mission.
Research on Interplanetary Storm has revealed that threat actors are both proficient in using Golang and development best practices, and well-versed at concealment of management nodes.
The unprotected bucket contains more than 2.5 million user records, including full names, email addresses, genders, interests, location coordinates, last login dates, selfies, and document photos.
According to a recent global study of cybersecurity professionals by the ISSA and analyst firm ESG, there has been no significant progress towards a solution to this problem in the last four years.
Since its initial discovery in 2018, Kaspersky identified three different malware families related to the IAmTheKing threat actor, including KingOfHearts, QueenOfHearts, and QueenOfClubs.
Some customers were unable to access their Nook libraries, some previous purchases had vanished, others were not able to log in to the firm's online platform, and connectivity issues ran rampant.
A report published by Accenture warns that the kind of criminal groups behind most damaging ransomware attacks now have more options than ever for accessing corporate networks.
Scams can arrive via various routes – on the doorstep, via phone calls or SMS texts, but it’s even easier for fraudsters to target victims by making their initial contact via email or social media.
Researchers who uncover vulnerabilities can make between $50 and $14,800, depending on the severity of the flaw. TikTok has previously worked with security research companies to fix flaws they found.
The bug, found by a security researcher at Netherlands-based start-up Securify, could be triggered by passing objects containing malicious code to a Servlet component of QRadar Community Edition.
Sonrai Security secured $20M in series B funding in a round led by Menlo Ventures, with full participation from founding investor Polaris Partners and Series A lead investor Ten Eleven Ventures.
Iran’s cybersecurity authority acknowledged cyberattacks on two governmental departments on Tuesday and Wednesday this week, the state-owned IRAN daily newspaper reported.
Emotet operators change email subject lines, the text in the email body, the file attachment type, but also the content of the file attachment, which is as important as the rest of the email.
Unit 42 researchers took a closer look at four Mirai variants from two recently discovered campaigns leveraging command injection vulnerability exploits that reveal a familiar IoT attack pattern.
Digital transformation projects and cloud-first or cloud-smart paradigms are proliferating, both of which complicate monitoring and visibility and increase challenges for security teams.
BAE Systems unveiled a cyber-threat detection and mitigation solution for U.S. military platforms. The Fox Shield suite is designed to help detect, respond, and recover from cyberattacks in real-time.
62% of SMBs do not conduct a security audit at least once a year – and 14% never conduct an audit at all. 57% of SMBs indicated they have experienced a phishing attack in the last three years.
A tactic which has been around for a few years now, and frequently successful. Scammers will often pretend to be customer support reps, then insert themselves into support discussions on social media.
Almost 2,000 Robinhood Markets accounts were compromised in a recent hacking spree that siphoned off customer funds, a sign that the attacks were more widespread than was previously known.
New research from KnowBe4 has revealed that coronavirus-related phishing emails remained the most promising attack type during the third-quarter of 2020 and will continue to foray into the last quarter.
The TrickBot gang operators are increasingly targeting high-value targets with the new stealthy BazarLoader trojan before deploying the Ryuk ransomware. The game is getting bigger than ever!
GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on show more ...
systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.
This Metasploit module exploits CVE-2019-1458, an arbitrary pointer dereference vulnerability within win32k which occurs due to an uninitialized variable, which allows user mode attackers to write a limited amount of controlled data to an attacker controlled address in kernel memory. By utilizing this vulnerability to show more ...
execute controlled writes to kernel memory, an attacker can gain arbitrary code execution as the SYSTEM user. This module has been tested against Windows 7 x64 SP1. Offsets within the exploit code may need to be adjusted to work with other versions of Windows. The exploit can only be triggered once against the target and can cause the target machine to reboot when the session is terminated.
The COVID-19 outreach is turning out to be not only health, social, and economic hazard but also a cybersecurity crisis. The pandemic has presented new challenges for businesses in the areas of remote collaboration and business continuity. With increased remote working for better business continuity, employees are using numerous Internet tools. As businesses and people have started relying more
We're in celebratory mood as we celebrate our 200th episode, but there's still time to discuss Fatima the ballerina who the UK government wants to become a cybersecurity expert, why women are quitting the tech industry, and a smartwatch which might be putting your kids at risk. All this and much more is show more ...
discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.
Many thanks to the great folks at Recorded Future, who are sponsoring my writing this week. Recorded Future empowers your organization, revealing unknown threats before they impact your business, and helping your teams respond to alerts 10 times faster. How does it do this? By automatically collecting and analyzing show more ...
intelligence from technical, open web, and … Continue reading "Elite security intelligence for zero cost. Meet the Recorded Future Express browser extension"
From the as-if-you-didn’t-have-enough-to-worry-about-in-2020 department, the FBI has warned that scammers are attempting to defraud the public by exploiting the COVID-19 pandemic. Read more in my article on the Hot for Security blog.
American bookselling giant Barnes & Noble is contacting customers via email, warning them that its network was breached by hackers, and that sensitive information about shoppers may have been accessed. Read more in my article on the Tripwire State of Security blog.