Hackers hit CD Projekt Red, steal data, ask for ransom

Polish game developer CD Projekt Red has been hit by hackers, who breached its internal network, stole data, encrypted some devices, and asked for a ransom to not sell of leak online sensitive company documents and the source code of some of their more… Continue reading Hackers hit CD Projekt Red, steal data, ask for ransom

The impact of COVID-19 on how CISOs make buying decisions

It’s no secret that the past year has resulted in organizations fast-tracking their digital transformation projects, making drastic changes to their operations while also attempting to prepare for a very uncertain future. To get a sense of the real imp… Continue reading The impact of COVID-19 on how CISOs make buying decisions

Cybercriminals moved quickly to capitalize on the COVID-19 outbreak using malicious emails

While the COVID-19 outbreak has disrupted the lives and operations of many people and organizations, the pandemic failed to interrupt onslaught of malicious emails targeting people’s inboxes, according to an attack landscape update published by F-Secur… Continue reading Cybercriminals moved quickly to capitalize on the COVID-19 outbreak using malicious emails

Investigation highlights the dangers of using counterfeit Cisco switches

An investigation, which concluded that counterfeit network switches were designed to bypass processes that authenticate system components, illustrates the security challenges posed by counterfeit hardware. The suspected counterfeit switch (on the left)… Continue reading Investigation highlights the dangers of using counterfeit Cisco switches

How do I select a mobile security solution for my business?

The percentage of companies admitting to suffering a mobile-related compromise has grown, despite a higher percentage of organizations deciding not to sacrifice the security of mobile devices to meet business targets. To make things worse, the C-suite … Continue reading How do I select a mobile security solution for my business?

Have you updated SaltStack Salt? Attacks are underway!

Have you updated your SaltStack Salt “masters” and made them inaccessible over the internet – or at least restricted access to them? Even though F-Secure researchers declined to publish PoC exploit code for two critical Salt flaws the… Continue reading Have you updated SaltStack Salt? Attacks are underway!

Hackers seize on software flaw to breach two victims, despite patch availability

Days after researchers warned of critical vulnerabilities in popular data-management software, hackers have exploited the flaws to breach two organizations which rely on the technology. LineageOS, a free Android-based operating system, and Ghost, a nonprofit behind widely used blogging software, reported Sunday that unidentified hackers had breached their infrastructure in separate incidents. The disruptions are an example of how bugs found in widely used code often end up being exploited maliciously — even when software updates are available. Both LineageOS and Ghost rely on a tool for managing data centers and cloud-computing networks known as the Salt management framework. Cybersecurity company F-Secure reported two vulnerabilities in Salt last week which could enable attackers to execute code remotely and manipulate data. “Both of these vulnerabilities are exploitable by a remote, unauthenticated attacker,” said Rody Quinlan, a researcher at another security vendor, Tenable. Ghost said it was rebuilding its network. Customer data […]

The post Hackers seize on software flaw to breach two victims, despite patch availability appeared first on CyberScoop.

Continue reading Hackers seize on software flaw to breach two victims, despite patch availability

Ransomware getting more fearsome, but there’s reason for optimism

Cybercriminals continued a barrage of attacks in 2019, spurred on by botnets of infected IoT devices and by attacker interest in the Eternal Blue vulnerability. A report from F-Secure documents a steep increase in attack traffic in 2019 that was unmatc… Continue reading Ransomware getting more fearsome, but there’s reason for optimism

New infosec products of the week: February 7, 2020

USB armory Mk II: A secure computer on a USB stick featuring open source hardware design The USB armory Mk II’s security features include internal and external cryptographic coprocessors, a true random number generator, secure boot capabilities, and mo… Continue reading New infosec products of the week: February 7, 2020

USB armory Mk II: A secure computer on a USB stick featuring open source hardware design

The hardware security professionals at F-Secure have created a new version of the USB armory – a computer on a USB stick built from the ground up to be secure. USB armory Mk II The USB armory Mk II entrenches security in its lowest levels and is suitab… Continue reading USB armory Mk II: A secure computer on a USB stick featuring open source hardware design