COVID-19 Vaccine Cyberattacks Steal Credentials, Spread Zebrocy Malware

Cybercriminals are leveraging the recent rollout of the COVID-19 vaccines globally in various cyberattacks – from stealing email passwords to distributing the Zebrocy malware. Continue reading COVID-19 Vaccine Cyberattacks Steal Credentials, Spread Zebrocy Malware

How do sites detect credential sniffing, and what is the purpose of this attack?

I just got an email from the Unsplash service telling me that someone had logged into my account via credential sniffing:

Five minutes later I get three more emails, each one notifying that a (generic) photo just uploaded to the account h… Continue reading How do sites detect credential sniffing, and what is the purpose of this attack?

Hang up the Phone: MFA’s Insecure Reliance on SMS

It’s hard enough to get people to use multi-factor authentication (MFA)—you know, something you know, you have and you are. Most websites, email accounts and other devices are secured (if at all) with a simple user ID (or email address) and password—a… Continue reading Hang up the Phone: MFA’s Insecure Reliance on SMS

Explosion in digital commerce pushed fraud incentive levels sky-high

A rise in consumer digital traffic has corresponded with a rise in fraud attacks, Arkose Labs reveals. As the year progresses and more people than ever are online, historically ‘normal’ online behavioral patterns are no longer applicable and holiday le… Continue reading Explosion in digital commerce pushed fraud incentive levels sky-high

Healthcare organizations are sitting ducks for attacks and breaches

Seventy-three percent of health system, hospital and physician organizations report their infrastructures are unprepared to respond to attacks. The survey results estimated 1500 healthcare providers are vulnerable to data breaches of 500 or more record… Continue reading Healthcare organizations are sitting ducks for attacks and breaches

Difference between access control systems that can/can’t be compromised without valid credentials?

Take the following examples:

When I run sshd, it can in theory grant access to anything that the process itself has access to, regardless of provided credentials. For example, I could in theory modify a single if statement in the sshd sou… Continue reading Difference between access control systems that can/can’t be compromised without valid credentials?

Researchers discover POS backdoor targeting the hospitality industry

ESET researchers have discovered ModPipe, a modular backdoor that gives its operators access to sensitive information stored in devices running ORACLE MICROS Restaurant Enterprise Series (RES) 3700 POS (point-of-sale) – a management software suite used… Continue reading Researchers discover POS backdoor targeting the hospitality industry

Fraudsters increasingly creative with names and addresses for phishing sites

COVID-19 continues to significantly embolden cybercriminals’ phishing and fraud efforts, according to research from F5 Labs. The report found that phishing incidents rose 220% during the height of the global pandemic compared to the yearly average. The… Continue reading Fraudsters increasingly creative with names and addresses for phishing sites

How is Firefox importing credentials from other browsers without the need for the admin password?

Im currently looking into the security of different browser password storing mechanisms. My main focus lies on the new Chromium based Microsoft Edge browser.
As far as I can see, Chromium based browsers use the system’s credential manager … Continue reading How is Firefox importing credentials from other browsers without the need for the admin password?