Data Security - Security Boulevard https://securityboulevard.com/category/blogs/data-security/ The Home of the Security Bloggers Network Wed, 27 Nov 2024 19:28:48 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png Data Security - Security Boulevard https://securityboulevard.com/category/blogs/data-security/ 32 32 133346385 Interpol, African Nations Arrest 1,006 in Sweeping ‘Operation Serengeti’ https://securityboulevard.com/2024/11/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti/ Wed, 27 Nov 2024 19:28:48 +0000 https://securityboulevard.com/?p=2037657 Interpol Operation Synergia ransomware phishing

Interpol led 19 African countries in a massive anti-cybercriminal effort dubbed "Operation Serengeti" that shut down a range of scams and attacks that bled $193 million from 35,000 victims. More than 1,000 people were arrested and more than 134,000 malicious infrastructures shut down.

The post Interpol, African Nations Arrest 1,006 in Sweeping ‘Operation Serengeti’ appeared first on Security Boulevard.

]]>
2037657
Supply Chain Ransomware Attack Hits Starbucks, UK Grocers https://securityboulevard.com/2024/11/supply-chain-ransomware-attack-hits-starbucks-uk-grocers/ Tue, 26 Nov 2024 15:37:56 +0000 https://securityboulevard.com/?p=2037607 supply, chain, Blue Yonder, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity

Coffee store giant Starbucks was among other organizations affected by a ransomware attack this month on cloud managed service provider Blue Yonder, a Panasonic subsidiary that has more than 3,000 customers. Two UK grocery chains also were impacted.

The post Supply Chain Ransomware Attack Hits Starbucks, UK Grocers appeared first on Security Boulevard.

]]>
2037607
QNAP’s Buggy Security Fix Causes Chaos https://securityboulevard.com/2024/11/qnap-bad-patch-richixbw/ Tue, 26 Nov 2024 14:54:57 +0000 https://securityboulevard.com/?p=2037597 Three tiny people cleaning the inside of a hard drive

RAID FAIL: NAS Maker does a CrowdStrike—cleanup on /dev/dsk/c1t2d3s4 please

The post QNAP’s Buggy Security Fix Causes Chaos appeared first on Security Boulevard.

]]>
2037597
Privileged Account Security in Active Directory https://securityboulevard.com/2024/11/privileged-account-security-in-active-directory/ https://securityboulevard.com/2024/11/privileged-account-security-in-active-directory/#respond Mon, 25 Nov 2024 16:01:03 +0000 https://www.enzoic.com/?p=83724 Privileged accounts in Active Directory (AD) are the keys to your organization’s most sensitive systems, data, and administrative tools. These accounts play an essential role in managing access and keeping things running smoothly, but they also come with significant security risks if not properly managed. Why Privileged Account Security in Active Directory Matters Access to […]

The post Privileged Account Security in Active Directory appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/11/privileged-account-security-in-active-directory/feed/ 0 2037520
Understanding Privileged Access Management (PAM): A Comprehensive Guide https://securityboulevard.com/2024/11/understanding-privileged-access-management-pam-a-comprehensive-guide/ https://securityboulevard.com/2024/11/understanding-privileged-access-management-pam-a-comprehensive-guide/#respond Mon, 25 Nov 2024 15:29:49 +0000 http://securityboulevard.com/?guid=362f818e5afc4e3d530d792f818cca44 Privileged Access Management (PAM) is crucial in today's threat landscape. This guide explores what PAM is, why it's essential for your organization, and how it safeguards against unauthorized access. Learn about best practices and key features to strengthen your security posture.

The post Understanding Privileged Access Management (PAM): A Comprehensive Guide appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/11/understanding-privileged-access-management-pam-a-comprehensive-guide/feed/ 0 2037569
Huge Leak of Customer Data Includes Military Personnel Info https://securityboulevard.com/2024/11/huge-leak-of-customer-data-includes-military-personnel-info/ Mon, 25 Nov 2024 15:07:01 +0000 https://securityboulevard.com/?p=2037509 military

EnamelPins, which manufactures and sells medals, pins, and other emblematic accessories, for months left open an Elasticsearch instance that exposed 300,000 customer emails, including 2,500 from military and government personnel. The company, based in California, also has links to China, Cybernews researchers wrote.

The post Huge Leak of Customer Data Includes Military Personnel Info appeared first on Security Boulevard.

]]>
2037509
Stay Safe Online This Black Friday: Protect Your Digital Security While Scoring the Best Deals https://securityboulevard.com/2024/11/stay-safe-online-this-black-friday-protect-your-digital-security-while-scoring-the-best-deals/ https://securityboulevard.com/2024/11/stay-safe-online-this-black-friday-protect-your-digital-security-while-scoring-the-best-deals/#respond Mon, 25 Nov 2024 13:15:11 +0000 https://blackcloak.io/?p=18027 ‘Tis the week of Black Friday deals, where the excitement of snagging those incredible deals can sometimes overshadow the importance of staying safe online. With cybercriminals on the prowl, it’s crucial to take steps to protect your digital security while shopping. Here are some tips to help you stay safe and secure during this shopping […]

The post Stay Safe Online This Black Friday: Protect Your Digital Security While Scoring the Best Deals appeared first on BlackCloak | Protect Your Digital Life™.

The post Stay Safe Online This Black Friday: Protect Your Digital Security While Scoring the Best Deals appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/11/stay-safe-online-this-black-friday-protect-your-digital-security-while-scoring-the-best-deals/feed/ 0 2037514
The Cyberthreats from China are Ongoing: U.S. Officials https://securityboulevard.com/2024/11/the-cyberthreats-from-china-are-ongoing-u-s-officials/ Mon, 25 Nov 2024 12:32:00 +0000 https://securityboulevard.com/?p=2037480 China, threats, scams, CISA TP-Link Volt Typhoon Salt Typhoon

U.S. officials are pushing back at the ongoing threats posted by Chinese state-sponsored hackers like Volt Typhoon and Salt Typhoon, which have infiltrated critical infrastructure organizations to steal information and preposition themselves in case of a conflict breaking out between the two countries.

The post The Cyberthreats from China are Ongoing: U.S. Officials appeared first on Security Boulevard.

]]>
2037480
Deepfake Fraud, Data Brokers Tracking Military Personnel https://securityboulevard.com/2024/11/deepfake-fraud-data-brokers-tracking-military-personnel/ https://securityboulevard.com/2024/11/deepfake-fraud-data-brokers-tracking-military-personnel/#respond Mon, 25 Nov 2024 05:00:33 +0000 https://sharedsecurity.net/?p=101974 In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores the controversial practices of data brokers selling location data, including tracking US military personnel. The conversation shifts to social media platforms Twitter, Blue […]

The post Deepfake Fraud, Data Brokers Tracking Military Personnel appeared first on Shared Security Podcast.

The post Deepfake Fraud, Data Brokers Tracking Military Personnel appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/11/deepfake-fraud-data-brokers-tracking-military-personnel/feed/ 0 2037472
The Hidden Dangers of Browser Extensions: Where Google’s MV3 Still Fall Short https://securityboulevard.com/2024/11/the-hidden-dangers-of-browser-extensions-where-googles-mv3-still-fall-short/ https://securityboulevard.com/2024/11/the-hidden-dangers-of-browser-extensions-where-googles-mv3-still-fall-short/#respond Mon, 25 Nov 2024 03:57:45 +0000 https://medium.com/p/6df84dc6c09b A recent Forbes article by Davey Winder discussed a brilliant publication by Stanford researchers Sheryl Hsu, Manda Tran and Aurore Fass. It was discovered nearly 350 million Chrome extensions installed had privacy violations, vulnerable code or contained malware. Many hoped that Google Chrome’s new Manifest V3 standard would be the solution to extension based vulnerabilities. Yet, released at Defcon32 this year, our research showed that MV3 compliant extensions can still silently add GitHub repo collaborators, mirror Zoom/Google Meet video feeds and steal user credentials/data relatively easily.

Surprisingly, many of these suspicious extensions are Chrome featured, a stamp of approval that many users, and often security teams, use as an indication of legitimacy and safety of browser extensions. While Google does its best to vet these technologies, there are over 100,000 active extensions on Chrome Store, making it impossible to keep track of all updates. On average, it takes 380 days for extensions with malware to be taken down from the Chrome Store.

Attackers exploit this fact by compromising or purchasing the rights to benign, popular extensions and turn them into malicious extensions, without users being aware of updates. One such case study is seen in the PDF Toolbox and Autoskip of YouTube malicious extensions uncovered by Palant. With 2 and 9 million downloads each, these seemingly benign extensions enter adware links into search bars against the user’s will.

This is just one way that extensions can exploit users. Five common browser extension based attacks include:

  1. Data Exfiltration

Attackers can collect rich data on user behaviour, selling them to companies and targeted ad providers. More targeted attacks can involve using extensions as spyware to read confidential information such as intellectual property, emails and other sensitive information. For companies, such data breaches can lead to expensive class action lawsuits, damage to brand reputation and loss of competitive edge for IP-sensitive companies.

2. Credential stealing

Extensions can gain access to PII such as credit card numbers and social security numbers, as well as gain access to banking and social media accounts. More advanced attackers can even silently add a collaborator to a developer’s GitHub repo, taking their code repo as hostage for ransomware. Since the White House banned most ransom payments in 2023, this poses a huge dilemma when platforms and resources critical to business are being held up by ransomware.

3. Adware & misinformation spreading

Attackers often use extensions to redirect users to ad pages or embed ads into websites without the user knowing. This not only significantly impairs the user’s productivity and experience by slowing down the browser, but may lead to subsequent infection with spyware/ransomware. A similar technique can also be used to display fake search results and spread false information.

4. Cryptojacking

One of the simplest ways to steal cryptocurrency involves injecting the attacker’s wallet address into the recipient field just as the user hits the transfer button, redirecting any currency flow to the attacker’s account. This could lead to significant personal financial loss and reputational damage for crypto exchanges.

5. Malware spreading

Through extensions, attackers can initiate malware downloads without the user’s permission. Smarter attackers can even trigger these downloads when users are on trusted sites (e.g. Zoom, Salesforce) and mask them as software updates to minimise suspicion.

This got me curious about how easy it is to purchase the rights to a Chrome featured extension. Hence, posing as an EdTech founder, I approached the authors of several translation extensions to see if they were willing to sell their extensions to me. I focused on those that had not updated their extension in at least 12 months but had at least 10,000 downloads on Chrome store. It turns out, once a price is agreed upon, all it took was for the author to hand over the credentials to their Chrome account, which would give me completely free access to the extension’s code repo.

If getting access to extensions already installed on millions of devices was indeed as simple as a price negotiation, there is a huge dissonance with the risk management of browser extensions. Speaking to over a dozen security experts, it is evident that most security teams whitelist extensions once do not have an active monitoring strategy for browser extensions. Even if they do, whitelists are reviewed on a 1–3 year basis, with no way of knowing when a benign extension becomes malicious.

In this case, how can one protect oneself against malicious browser extensions? Here are a couple of best practices:

  • Read, read, read — read reviews, especially negative ones, thoroughly. Do this even for Chrome featured and popular extensions. Index on more recent reviews.
  • Check when the extension was last updated — generally, the longer a software goes without an update, the more likely it is unmanaged and vulnerable to attacks. While there is no magic number, I generally get nervous when installing extensions with no updates in more than 3–6 months.
  • Chuck it — uninstall or disable extensions when you don’t need it. I know it is a bit of extra work, but generally the less on, the safer.
  • Have runtime control — the best way to guarantee extension safety is to use a tool that automatically disables and/or alerts you whenever an extension turns malicious, is updated or goes too long without being updated (depending on your risk appetite).


The Hidden Dangers of Browser Extensions: Where Google’s MV3 Still Fall Short was originally published in SquareX Labs on Medium, where people are continuing the conversation by highlighting and responding to this story.

The post The Hidden Dangers of Browser Extensions: Where Google’s MV3 Still Fall Short appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/11/the-hidden-dangers-of-browser-extensions-where-googles-mv3-still-fall-short/feed/ 0 2037551