Ukraine’s Volunteer ‘IT Army’ Is Hacking in Uncharted Territory

Credit to Author: Matt Burgess| Date: Sun, 27 Feb 2022 20:25:30 +0000
The country has enlisted thousands of cybersecurity professionals in the war effort against Russia.
Read more
Credit to Author: Matt Burgess| Date: Sun, 27 Feb 2022 20:25:30 +0000
The country has enlisted thousands of cybersecurity professionals in the war effort against Russia.
Read more
Credit to Author: Evan Schuman| Date: Mon, 28 Feb 2022 03:00:00 -0800
Behavioral analytics is one of the best authentication methods around — especially when it’s part of continuous authentication. Authentication as a “one-and-done” is something that simply shouldn’t happen anymore. Then again, I’ve argued the same thing about using unencrypted SMS as a form of multi-factor authentication and I sadly still see that being used by lots of Fortune 1000 firms.
Oh well.
Although most enterprise CISOs are fine with behavioral analytics on paper (on a whiteboard? As a message within Microsoft Teams/GoogleMeet/Zoom?), they’re resistant to rapid widespread deployment because it requires creating a profile for every user — including partners, distributors, suppliers, large customers and anyone else who needs system access. Those profiles can take more than a month to create to get an accurate, consistent picture of each person.

Credit to Author: Brian Barrett| Date: Sat, 26 Feb 2022 14:00:00 +0000
Plus: Hacker recruits, NFT thefts, and more of the week’s top security news.
Read more
Credit to Author: Matt Burgess| Date: Sat, 26 Feb 2022 12:00:00 +0000
Cookies are on the way out—but not enough is being done about browser fingerprinting. So what is it?
Read more
Credit to Author: Andy Greenberg| Date: Fri, 25 Feb 2022 17:07:00 +0000
Russia’s invasion into the country sparked a surge of crypto donations to resistance groups.
Read more
Credit to Author: Garrett M. Graff| Date: Fri, 25 Feb 2022 01:04:25 +0000
By promising a response “never seen” in history if other countries interfere in Ukraine, the Russian leader upended decades of relative stability.
Read more
Credit to Author: Preston Gralla| Date: Fri, 25 Feb 2022 03:00:00 -0800
Russia telegraphed its intentions to invade Ukraine well ahead of this week’s attack by massing nearly 200,000 soldiers along Ukraine’s borders, and by Vladimir Putin’s increasingly belligerent threats.
Behind the scenes, Russia was doing more than that, including dangerous cyberattacks launched against Ukraine. And as is typically the case in such attacks, Windows was the attack vector.
“We’ve observed destructive malware in systems belonging to several Ukrainian government agencies and organizations that work closely with the Ukrainian government, Tom Burt, Microsoft corporate vice president for customer security and trust, wrote in a blog post in mid-January. “The malware is disguised as ransomware but, if activated by the attacker, would render the infected computer system inoperable.” In a related technical post detailing how the malware works, Microsoft added: “These systems [under cyberattack] span multiple government, non-profit, and information technology organizations, all based in Ukraine.”

Credit to Author: Andy Greenberg| Date: Wed, 23 Feb 2022 20:36:40 +0000
Western intelligence services are raising alarms about Cyclops Blink, the latest tool at the notorious group’s disposal.
Read more
Credit to Author: Lily Hay Newman| Date: Wed, 23 Feb 2022 12:00:00 +0000
Researchers at iSTARE have to think like the bad guys, finding critical flaws before processors go to production.
Read more
Credit to Author: Andy Greenberg| Date: Tue, 22 Feb 2022 18:00:00 +0000
Anything from a metallic Rubik’s cube to an aluminum trash can inside a room could give away your private conversations.
Read more