When Low-Tech Hacks Cause High-Impact Breaches

Credit to Author: BrianKrebs| Date: Mon, 27 Feb 2023 04:15:15 +0000

Web hosting giant GoDaddy made headlines this month when it disclosed that a multi-year breach allowed intruders to steal company source code, siphon customer and employee login credentials, and foist malware on customer websites. Media coverage understandably focused on GoDaddy’s admission that it suffered three different cyberattacks over as many years at the hands of the same hacking group.  But it’s worth revisiting how this group typically got in to targeted companies: By calling employees and tricking them into navigating to a phishing website.

Read more

Who’s Behind the Botnet-Based Service BHProxies?

Credit to Author: BrianKrebs| Date: Fri, 24 Feb 2023 19:51:23 +0000

A security firm has discovered that a five-year-old crafty botnet known as Mylobot appears to be powering a residential proxy service called BHProxies, which offers paying customers the ability to route their web traffic anonymously through compromised computers. Here’s a closer look at Mylobot, and a deep dive into who may be responsible for operating the BHProxies service.

Read more

Hard-to-spot Mac crypto-mining threat, XMRig, hits Pirate Bay

A new family of Mac malware that spreads through pirated versions of Final Cut Pro, Photoshop, and other key creative apps has been identified by the Threat Labs team at Jamf.

The new XMRig threat is a subtle cryptocurrency mining attack that has evaded detection for months.

Piracy is bad karma, but good crypto

XMRig proliferates by attaching itself to pirated copies of creative applications, including versions of Final Cut Pro, Logic Pro X, and Adobe Photoshop. That’s the kind of “knock-off” Mac application you frequently find being distributed across peer to peer networks.

To read this article in full, please click here

Read more

EU parliamentary committee says 'no' to EU-US data privacy framework

The European Parliament’s Committee on Civil Liberties, Justice and Home Affairs has recommended that the European Commission reject the proposed EU-US Data Privacy Framework, which would govern the way in which the personal information of EU citizens is handled by US companies.

The committee’s decision — formally, a draft motion for a resolution— represents a rejection of the European Commission’s recommendation, announced in December, that the data privacy framework should be adopted. The recommendation stated that US law now offers an “adequate” level of protection for the personal data of EU users of US companies’ services.

To read this article in full, please click here

Read more

New Protections for Food Benefits Stolen by Skimmers

Credit to Author: BrianKrebs| Date: Fri, 17 Feb 2023 21:09:07 +0000

Millions of Americans receiving food assistance benefits just earned a new right that they can’t yet enforce: The right to be reimbursed if funds on their Electronic Benefit Transfer (EBT) cards are stolen by card skimming devices secretly installed at cash machines and grocery store checkout lanes.

Read more

Three zero-days require urgent attention for Windows, Exchange

Read more

Security tool adoption jumps, Okta report shows

Identity and access management (IAM) vendor Okta today released a report detailing app use and security trends among its broad user base. Among other trends it identified, the report found that zero trust security policies have become more common, and uptake of a wide range of security tools has been sharply on the rise.

Okta survyed 17,000 customers globally, and found that zero trust usage among its  clients has increased from 10% two years ago to 22% today, indicating both that the philosophy is more popular than ever, and that a wide swathe of the market is still there to be captured, according to the report.

To read this article in full, please click here

Read more

Download: UEM vendor comparison chart 2023

Credit to Author: ,| Date: Wed, 15 Feb 2023 03:00:00 -0800

Unified endpoint management (UEM) is a strategic IT approach that consolidates how enterprises secure and manage an array of deployed devices including phones, tablets, PCs, and even IoT devices.

As remote and hybrid work models have become the norm over the past two years, “mobility management” has come to mean management of not just mobile devices, but all devices used by mobile employees wherever they are. UEM tools incorporate existing enterprise mobility management (EMM) technologies, such as mobile device management (MDM) and mobile application management (MAM), with tools used to manage desktop PCs and laptops.

To read this article in full, please click here

Read more