Security News > 2022 > July

Magecart Hacks Food Ordering Systems to Steal Payment Data from Over 300 Restaurants
2022-07-25 09:13

Three restaurant ordering platforms MenuDrive, Harbortouch, and InTouchPOS were the target of two Magecart skimming campaigns that resulted in the compromise of at least 311 restaurants. "The online ordering platforms MenuDrive and Harbortouch were targeted by the same Magecart campaign, resulting in e-skimmer infections on 80 restaurants using MenuDrive and 74 using Harbortouch," cybersecurity firm Recorded Future revealed in a report.

Racoon Stealer is Back — How to Protect Your Organization
2022-07-25 08:52

The Racoon Stealer malware as a service platform gained notoriety several years ago for its ability to extract data that is stored within a Web browser. Racoon Stealer was also designed to steal auto-fill data, which can include a vast trove of personal information ranging from basic contact data to credit card numbers.

Organizations struggle to manage devices and stay ahead of vulnerabilities
2022-07-25 08:00

Most enterprises scramble to maintain visibility and control of their endpoint devices, leading to increased security breaches and impaired ability to ward off outside attacks, according to a survey conducted by Ponemon Institute. This Help Net Security video reveals how enterprises struggle to maintain visibility and control of their endpoint devices.

Why firms need to harness identity management before it spirals into an identity crisis
2022-07-25 05:00

An incomplete identity management strategy has a serious impact on the success of digital transformation, as well as increasing cyber risk exposure. Identity data plays a fundamental role in this, and achieving impactful results is all but impossible without effective identity management.

Minimizing risk: Key cybersecurity-related M&A considerations
2022-07-25 04:30

Global M&A hit new highs in 2021 reaching an eye-popping $5.1 trillion in total deal value, according to PwC. With economic headwinds leaving acquisition as the only viable exit, further consolidation in the market is inevitable. One thing that typically gets overlooked in that M&A frenzy, is the technical difficulties of inheriting digital assets of the acquired company and the cybersecurity risk that comes with it.

Building trust into every aspect of an organization
2022-07-25 04:00

In this Help Net Security video, Matthew Chiodi, Chief Trust Officer at Cerby, talks about building trust not just when it comes to applications and data, but also with employees and customers....

This Cloud Botnet Has Hijacked 30,000 Systems to Mine Cryptocurrencies
2022-07-25 03:41

The 8220 cryptomining group has expanded in size to encompass as many as 30,000 infected hosts, up from 2,000 hosts globally in mid-2021. "8220 Gang is one of the many low-skill crimeware gangs we continually observe infecting cloud hosts and operating a botnet and cryptocurrency miners through known vulnerabilities and remote access brute forcing infection vectors," Tom Hegel of SentinelOne said in a Monday report.

Monitoring the impact of security solutions on user experiences is critical
2022-07-25 03:30

Further highlighting this conflict is the finding that 46% of respondents have bypassed security to improve user experiences. Survey respondents are largely united in their belief that monitoring the impact of security solutions on user experiences is critical.

Trust in fintech security has been wavering
2022-07-25 03:00

In Q1 of 2022, fintech companies experienced 2.5 times more attacks than in the two previous years. The growing rate of cybercrime has added to the market unrest and questioned fintech preparedness; some claimed that the industry players are more susceptible to virtual threats than traditional banking, with greater resources at their disposal.

Cybersecurity and the Big Data Problem: Human Security Operations Alone Struggle to Keep Pace
2022-07-25 00:00

Many of today's cyberattacks are broken into multiple stages of activity, each of which on its own is often difficult to discern as malicious rather than benign. Discernment is even more difficult given the volume of legitimate activity within which it naturally occurs given the diversity of work styles, devices, networks, applications, and cloud-delivery locations.