Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Innovation in enterp ...

 Business

It is no secret that business cannot survive without innovation. To gain competitive advantage, companies must continually develop, introducing new processes, new technologies, new tools. Wholesale digitalization has affected innovation in at least two ways. On the one hand, it has prepared the ground to ease the way   show more ...

for the adoption of new ideas. On the other, it has opened the door to new threats by complicating IT infrastructure. Our colleagues investigated enterprise-level attitudes toward innovations: how they are implemented and what hinders the process. To do so, with the help of independent research company Savanta, they interviewed more than 300 employees of large companies in North America, Europe, the Middle East, Latin America, the Commonwealth of Independent States, and the Asia-Pacific region. The survey focused on the people responsible for innovation-related decisions, be they external, affecting clients and end products, or internal, affecting employees and work processes. Judging by the answers, innovations often fall short in the implementation stage. The reasons are many (you’ll find them in the full version of the report), but most often failure is the result of insufficient planning. At the same time, 74% of respondents believe that innovations are bound to fail unless the CISO (chief information security officer) is involved. As you might imagine, we’re most interested in issues pertaining to information security, so we were very interested to learn that the areas of innovation that decision makers consider the most promising also happen to be those they think most threaten corporate data security. In particular, 30% of respondents believe that the introduction of new IoT devices increases the risk of attacks and data leaks, 26% point to artificial intelligence, and 25% name blockchain technology as the threat amplifier. However, our colleagues’ interests went beyond security. They also posed questions about the creation of new job roles connected directly to business development through innovation, as well as pinpointing what can go wrong and how to avoid new problems. You can download the full report here.

image for Breach at Dickey’s ...

 Data Breaches

One of the digital underground’s most popular stores for peddling stolen credit card information began selling a batch of more than three million new card records this week. KrebsOnSecurity has learned the data was stolen in a lengthy data breach at more than 100 Dickey’s Barbeque Restaurant locations   show more ...

around the country. An ad on the popular carding site Joker’s Stash for “BlazingSun,” which fraud experts have traced back to a card breach at Dickey’s BBQ. On Monday, the carding bazaar Joker’s Stash debuted “BlazingSun,” a new batch of more than three million stolen card records, advertising “valid rates” of between 90-100 percent. This is typically an indicator that the breached merchant is either unaware of the compromise or has only just begun responding to it. Multiple companies that track the sale in stolen payment card data say they have confirmed with card-issuing financial institutions that the accounts for sale in the BlazingSun batch have one common theme: All were used at various Dickey’s BBQ locations over the past 13-15 months. KrebsOnSecurity first contacted Dallas-based Dickey’s on Oct. 13. Today, the company shared a statement saying it was aware of a possible payment card security incident at some of its eateries: “We received a report indicating that a payment card security incident may have occurred. We are taking this incident very seriously and immediately initiated our response protocol and an investigation is underway. We are currently focused on determining the locations affected and time frames involved. We are utilizing the experience of third parties who have helped other restaurants address similar issues and also working with the FBI and payment card networks. We understand that payment card network rules generally provide that individuals who timely report unauthorized charges to the bank that issued their card are not responsible for those charges.” The confirmations came from Miami-based Q6 Cyber and Gemini Advisory in New York City. Q6Cyber CEO Eli Dominitz said the breach appears to extend from May 2019 through September 2020. “The financial institutions we’ve been working with have already seen a significant amount of fraud related to these cards,” Dominitz said. Gemini says its data indicated some 156 Dickey’s locations across 30 states likely had payment systems compromised by card-stealing malware, with the highest exposure in California and Arizona. Gemini puts the exposure window between July 2019 and August 2020. “Low-and-slow” aptly describes the card breach at Dickie’s, which persisted for at least 13 months. With the threat from ransomware attacks grabbing all the headlines, it may be tempting to assume plain old credit card thieves have moved on to more lucrative endeavors. Alas, cybercrime bazaars like Joker’s Stash have continued plying their trade, undeterred by a push from the credit card associations to encourage more merchants to install credit card readers that require more secure chip-based payment cards. That’s because there are countless restaurant locations — usually franchise locations of an established eatery chain — that are left to decide for themselves whether and how quickly they should make the upgrades necessary to dip the chip versus swipe the stripe. “Dickey’s operates on a franchise model, which often allows each location to dictate the type of point-of-sale (POS) device and processors that they utilize,” Gemini wrote in a blog post about the incident. “However, given the widespread nature of the breach, the exposure may be linked to a breach of the single central processor, which was leveraged by over a quarter of all Dickey’s locations.” While there have been sporadic reports about criminals compromising chip-based payment systems used by merchants in the U.S., the vast majority of the payment card data for sale in the cybercrime underground is stolen from merchants who are still swiping chip-based cards. This isn’t conjecture; relatively recent data from the stolen card shops themselves bear this out. In July, KrebsOnSecurity wrote about an analysis by researchers at New York University, which looked at patterns surrounding more than 19 million stolen payment cards that were exposed after the hacking of BriansClub, a top competitor to the Joker’s Stash carding shop. The NYU researchers found BriansClub earned close to $104 million in gross revenue from 2015 to early 2019, and listed over 19 million unique card numbers for sale. Around 97% of the inventory was stolen magnetic stripe data, commonly used to produce counterfeit cards for in-person payments. Visa and MasterCard instituted new rules in October 2015 that put retailers on the hook for all of the losses associated with counterfeit card fraud tied to breaches if they haven’t implemented chip-based card readers and enforced the dipping of the chip when a customer presents a chip-based card. Dominitz said he never imagined back in 2015 when he founded Q6Cyber that we would still be seeing so many merchants dealing with magstripe-based data breaches. “Five years ago I did not expect we would be in this position today with card fraud,” he said. “You’d think the industry in general would have made a bigger dent in this underground economy a while ago.” Tired of having your credit card re-issued and updating your payment records at countless e-commerce sites every time some restaurant you frequent has a breach? Here’s a radical idea: Next time you visit an eatery (okay, if that ever happens again post-COVID, etc), ask them if they use chip-based card readers. If not, consider taking your business elsewhere.

 Trends, Reports, Analysis

The DVLA said it submitted 181 breach notifications to the Information Commissioner’s Office (ICO) across 2019-20. By contrast, the Home Office submitted just 25 during the period.

 Breaches and Incidents

The unprotected bucket contains more than 2.5 million user records, including full names, email addresses, genders, interests, location coordinates, last login dates, selfies, and document photos.

 Malware and Vulnerabilities

Since its initial discovery in 2018, Kaspersky identified three different malware families related to the IAmTheKing threat actor, including KingOfHearts, QueenOfHearts, and QueenOfClubs.

 Identity Theft, Fraud, Scams

Scams can arrive via various routes – on the doorstep, via phone calls or SMS texts, but it’s even easier for fraudsters to target victims by making their initial contact via email or social media.

 Companies to Watch

Sonrai Security secured $20M in series B funding in a round led by Menlo Ventures, with full participation from founding investor Polaris Partners and Series A lead investor Ten Eleven Ventures.

 Malware and Vulnerabilities

Emotet operators change email subject lines, the text in the email body, the file attachment type, but also the content of the file attachment, which is as important as the rest of the email.

 Identity Theft, Fraud, Scams

A tactic which has been around for a few years now, and frequently successful. Scammers will often pretend to be customer support reps, then insert themselves into support discussions on social media.

 Feed

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on   show more ...

systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

 Feed

This Metasploit module exploits CVE-2019-1458, an arbitrary pointer dereference vulnerability within win32k which occurs due to an uninitialized variable, which allows user mode attackers to write a limited amount of controlled data to an attacker controlled address in kernel memory. By utilizing this vulnerability to   show more ...

execute controlled writes to kernel memory, an attacker can gain arbitrary code execution as the SYSTEM user. This module has been tested against Windows 7 x64 SP1. Offsets within the exploit code may need to be adjusted to work with other versions of Windows. The exploit can only be triggered once against the target and can cause the target machine to reboot when the session is terminated.

 Feed

The COVID-19 outreach is turning out to be not only health, social, and economic hazard but also a cybersecurity crisis. The pandemic has presented new challenges for businesses in the areas of remote collaboration and business continuity. With increased remote working for better business continuity, employees are using numerous Internet tools. As businesses and people have started relying more

 Podcast

We're in celebratory mood as we celebrate our 200th episode, but there's still time to discuss Fatima the ballerina who the UK government wants to become a cybersecurity expert, why women are quitting the tech industry, and a smartwatch which might be putting your kids at risk. All this and much more is   show more ...

discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.

 Feed only

Many thanks to the great folks at Recorded Future, who are sponsoring my writing this week. Recorded Future empowers your organization, revealing unknown threats before they impact your business, and helping your teams respond to alerts 10 times faster. How does it do this? By automatically collecting and analyzing   show more ...

intelligence from technical, open web, and … Continue reading "Elite security intelligence for zero cost. Meet the Recorded Future Express browser extension"

 Guest blog

From the as-if-you-didn’t-have-enough-to-worry-about-in-2020 department, the FBI has warned that scammers are attempting to defraud the public by exploiting the COVID-19 pandemic. Read more in my article on the Hot for Security blog.

2020-10
Aggregator history
Thursday, October 15
THU
FRI
SAT
SUN
MON
TUE
WED
OctoberNovemberDecember