The MerchantStore

DirectoryAbout UsAdd-siteLink to Us

 

1,000 Internet — Security Issues Entries

Internet — Security Issues — March 15th, 2024

43 Million Possibly Impacted by French Government Agency Data Breach
Recent data breach at unemployment agency France Travail (Pôle Emploi) could impact 43 million people.
March 15th, 2024Source

AI-Led Edge Computing Spends to Reach $350B Soon
Artificial intelligence is turning everything it touches into a golden investment opportunity. Edge computing - which is set to play a pivotal role in deploying AI, according to International Data Corp. - is in line to receive $350 billion worth of investments by 2027.
March 15th, 2024Source or Source or Source or Source or Source

As if working at Helldesk weren't bad enough, IT helpers now targeted by cybercrims
Wave of Okta attacks mark what researchers are calling the biggest security trend of the year
March 15th, 2024Source

Codezero Raises $3.5 Million for DevOps Security Solution
Secure enterprise microservices development firm Codezero raises $3.5 million in seed funding.
March 15th, 2024Source

Criminals take over family's Cricket account and drain their bank and investment apps
We've been trying to warn you about how real the threat of SIM Swapping is. By obtaining a SIM connected to your mobile account, a thief can use a burner phone, insert the SIM card, and take over your apps including financial apps. As a result, these criminals will drain your bank accounts, and max out your credit cards. It's scary, to be sure.
March 15th, 2024Source

Dark web election posts up almost 400 percent
The number of new posts on dark web forums about elections surged by 394 percent in 2023 compared to 2022, research released this week by cybersecurity firm NordVPN reveals. And in the first two months of 2024 alone, users have already published almost half as many posts.
March 15th, 2024Source

Discontinued Security Plugins Expose Many WordPress Sites to Takeover
Thousands of WordPress sites are at risk of takeover due to a critical privilege escalation vulnerability in two closed MiniOrange plugins.
March 15th, 2024Source

Experts Say Chinese Safes Pose Risks to US National Security
A senior U.S. senator is raising concerns that Beijing may be able to gain unauthorized access to commercial electronic safes made in China and used by the American public.
March 15th, 2024Source or Source or Source or Source

Google Chrome gets real-time phishing and malware protection with upgraded Safe Browsing feature
It will be available on all desktop and mobile platforms by the end of this month
March 15th, 2024Source

Illicit Credentials Marketplace Admin Gets 42-Month Sentence
A co-administrator of an illicit online marketplace received a 42-month prison sentence in U.S. federal court after pleading guilty to two criminal counts that could have put him in prison for 15 years.
March 15th, 2024Source or Source or Source or Source or Source

In Other News: CISA Hacked, Chinese Lock Backdoors, Exposed Secrets
Noteworthy stories that might have slipped under the radar: CISA hacked via Ivanti vulnerabilities, Chinese electronic lock backdoors, secrets exposed on GitHub.
March 15th, 2024Source

International Monetary Fund email accounts hacked in cyberattack
The International Monetary Fund (IMF) disclosed a cyber incident on Friday after unknown attackers breached 11 IMF email accounts earlier this year.
March 15th, 2024Source

ISMG Editors: Inside the Politics of US Cybersecurity
In the latest weekly update, Grant Schneider of Venable LLP joined three Information Security Media Group editors to discuss the future of U.S. federal cybersecurity and privacy legislation, AI integration and recent CISA developments - all set against a backdrop of political complexities.
March 15th, 2024Source or Source or Source or Source or Source

McDonald's: Global outage was caused by "configuration change"
McDonald's has blamed a third-party service provider's configuration change, not a cyberattack, for the global outage that forced many of its fast-food restaurants to close.
March 15th, 2024Source

Microsoft is once again harassing Chrome users with malware-like Bing ads
Microsoft is back to its classic tactics of harassing users to make them switch from competing services. Multiple posts on Reddit and other social media report that the company is once pedaling malware-like popup banners asking Chrome users to set Bing as the default search engine in exchange for free access to GPT-4.
March 15th, 2024Source

Pentagon Appoints New Chief Artificial Intelligence Officer
The first-ever head of the Pentagon's Chief Digital and Artificial Intelligence Office is stepping down from his post in April after building the newly created division into a highly influential component of the department and its operations.
March 15th, 2024Source or Source or Source or Source

Pressure Mounts on Meta to Scrap 'Pay or OK' Model in EU
Facebook's attempt to navigate European privacy regulations by giving users a fee-based opt-out from behavioral advertising triggered backlash from more than a dozen European politicians who accused the social media giant of treating human rights as a commodity.
March 15th, 2024Source or Source or Source or Source or Source

Protecting Medical Devices Against Future Cyberthreats
Healthcare organizations and makers of medical devices need to think about how to safeguard their critical medical gear against future cyberthreats, including the looming dangers posed by quantum computing, said Mike Nelson, global vice president of digital trust at security firm DigiCert.
March 15th, 2024Source or Source or Source or Source or Source

QNAP Systems Patches Critical Vulnerability
QNAP Systems on Saturday released a patch for a critical bug that allows unauthorized access to devices without authentication.
March 15th, 2024Source or Source or Source or Source or Source

Ransomware Groups' Data Leak Blogs Lie: Stop Trusting Them
Ransomware gangs are not reliable sources of information. Groups that run data leak blogs - and not all do - use them to pressure new and future victims into paying for the promise of either a decryptor or a pledge to delete stolen data.
March 15th, 2024Source or Source or Source or Source or Source

Sophos: Cyber Security Professional Burnout Is Widespread, Creating Risk for APAC Organisations
Burnout and fatigue among cyber professionals are leading to flow-on consequences like more data breaches, employee apathy to cyber duties and turnover of cyber workforces during a skills crisis.
March 15th, 2024Source

The SAFE Act to Reauthorize Section 702 is Two Steps Forward, One Step Back
Section 702 of the Foreign Intelligence Surveillance Act (FISA) is one of the most insidious and secretive mass surveillance authorities still in operation today. The Security and Freedom Enhancement (SAFE) Act would make some much-needed and long fought-for reforms, but it also does not go nearly far enough to rein in a surveillance law that the federal government has abused time and time again.
March 15th, 2024Source

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate
Red Canary’s 2024 Threat Detection Report is based on analysis of almost 60,000 threats across 216 petabytes of telemetry from over 1,000 customers’ endpoints.
March 15th, 2024Source

Transforming a Cyber Program in the Aftermath of an Attack
In the aftermath of a ransomware attack several years ago, Hackensack Meridian Health embarked on transforming its cybersecurity program with the support of top leadership and increased funding and staff and by implementing critical security tools and best practices, said CISO Mark Johnson.
March 15th, 2024Source or Source or Source or Source or Source

Why Are There Fewer Women Than Men in Cybersecurity?
The underrepresentation of women in cybersecurity is a complex issue that reflects broader societal, educational and workplace factors. Despite the critical importance of cybersecurity in safeguarding our digital world, women are significantly underrepresented in this field. This disparity not only highlights industry-wide issues of equality and diversity, but it also underscores a missed opportunity for cybersecurity teams to benefit from a wider range of perspectives and skills.
March 15th, 2024Source or Source or Source or Source or Source

Why Wiz Wants to Buy Cloud Startup Gem Security for $350M
Cloud security phenom Wiz's reported that it is pursuing an additional $800 million in funding just a year after raising $300 million in capital - a move that surprised industry observers.
March 15th, 2024Source or Source or Source or Source or Source

You May Need Your COLA Letter This Year. Where to Find It
If you accidentally tossed your cost-of-living adjustment letter from the Social Security Administration, we can help.
March 15th, 2024Source

Zscaler Expands AI Security Capabilities by Acquiring Avalor
Zscaler bought a data security startup led by a longtime Salesforce executive to help customers stay ahead of threats by beefing up data quality and AI models.
March 15th, 2024Source or Source or Source

Internet — Security Issues — March 14th, 2024

Amid paralyzing ransomware attack, feds probe UnitedHealth’s HIPAA compliance
UnitedHealth said it will cooperate with the probe as it works to restore services.
March 14th, 2024Source

As Attackers Refine Tactics, 'Speed Matters,' Experts Warn
Advanced attackers increasingly feel the need for speed, sometimes requiring "only a couple of hours between compromise and exfiltration" of data.
March 14th, 2024Source or Source or Source

Ballistic Ventures Closes $360 Million Cybersecurity-Focused Fund
Venture capital firm Ballistic Ventures closed an oversubscribed $360 million fund that will be used to fund cybersecurity companies.
March 14th, 2024Source

Bill That Could Ban TikTok Passed in the House. Here’s What to Know
The House passed legislation that would ban TikTok if its China-based owner ByteDance doesn’t sell its stakes in the popular social media platform within six months of the bill’s enactment.
March 14th, 2024Source

Boat Dealer MarineMax Hit by Cyberattack
MarineMax, one of the world’s largest retailers of recreational boats and yachts, discloses a cyberattack.
March 14th, 2024Source

BotGuard Raises $13 Million to Protect Against Harmful Web Traffic
BotGuard OU raises $13 million in Series A funding to help hosting providers filter traffic and protect infrastructures.
March 14th, 2024Source

Breach Roundup: US FCC Authorizes IoT Cybersecurity Label
Every week, Information Security Media Group rounds up cybersecurity incidents and breaches around the world. This week, the FCC OK'd cybersecurity labeling, DarkGate exploited Google, Fortinet patched a bug, cyberattacks hit the French government and employment agencies, Google restricted Gemini AI chatbot and paid bug bounties, Microsoft had Patch Tuesday, Marine Max was attacked, and Alcasec moved on.
March 14th, 2024Source or Source or Source or Source or Source

Cado Security enables organizations to investigate and respond to potential M365 threats
Cado Security announced that the Cado platform now enables customers to acquire Microsoft 365 Unified Audit Log (UAL) to help investigate and respond to Microsoft 365 compromises such as business email compromise (BEC), account takeover (ATO), and insider threats.
March 14th, 2024Source

Chrome’s Standard Safe Browsing Now Has Real-Time URL Protection
Chrome’s standard Safe Browsing protections now provide real-time malicious site detection and Password Checkup on iOS now flags weak passwords.
March 14th, 2024Source

Cisco Patches High-Severity IOS RX Vulnerabilities
Cisco releases patches for high-severity denial-of-service and elevation of privilege vulnerabilities in IOS RX software.
March 14th, 2024Source

Cloud Network Security with Agility and Scale on a Platform
Agility, scale and consumption - these are three business benefits brought to cloud network security by Palo Alto Networks Software Firewalls. Tiffany Henry and Katherine Rigdon of Palo Alto Networks showcase these features and the value of finding them all on a single platform.
March 14th, 2024Source or Source or Source or Source or Source

Concentric AI introduces Copilot data risk module
Concentric AI announced its new Copilot data risk module that delivers data security governance of Copilot data inputs and outputs to ensure that sensitive data – from financial information to IP to business data – remains protected within the organization.
March 14th, 2024Source

Critical FortiClient EMS vulnerability fixed, (fake?) PoC for sale (CVE-2023-48788)
A recently fixed SQL injection vulnerability (CVE-2023-48788) in Fortinet’s FortiClient Endpoint Management Server (EMS) solution has apparently piqued the interest of many: Horizon3’s Attack Team means to publish technical details and a proof-of-concept exploit for it next week, and someone is attempting to sell a PoC for less than $300 via GitHub.
March 14th, 2024Source

Cryptohack Roundup: Crypto Losses Mount as Phishing Rages
Every week, Information Security Media Group rounds up cybersecurity incidents in digital assets. This week, amounts for crypto and phishing losses were released, the Bitcoin Fog operator was convicted, the EU approved rules to strengthen sanctions, the federal government sought to recover losses linked to pig butchering, and the Philippines blocked unlicensed crypto websites.
March 14th, 2024Source or Source or Source or Source

Cyber Madness Bracket Challenge – Register to Play
SecurityWeek’s Cyber Madness Bracket Challenge is a contest designed to bring the community together in a fun, competitive way through one of America’s top sporting events.
March 14th, 2024Source

Elevate Your Security Posture: Grafana for Real-Time Security Analytics and Alerts
This article provides a detailed walkthrough on setting up Grafana for real-time security monitoring, crafting insightful dashboards, and configuring effective alerts.
March 14th, 2024Source

Feds Launch Investigation Into Change Healthcare Attack
UnitedHealth Group has yet to publicly confirm whether the cyberattack on its Change Healthcare IT services unit has resulted in a data breach. That's not stopping federal regulators from launching a full-fledged investigation into a massive compromise of protected health information potentially affecting millions of individuals.
March 14th, 2024Source or Source or Source or Source or Source

Four Common CI/CD Pipeline Vulnerabilities
The continuous integration/continuous delivery (CI/CD) pipeline can contain numerous vulnerabilities for hackers to exploit. Here's how to address them.
March 14th, 2024Source

French unemployment agency data breach impacts 43 million people
France Travail is the French governmental agency responsible for registering unemployed individuals, providing financial aid, and assisting them in finding jobs.
March 14th, 2024Source

Government Launches Probe Into Change Healthcare Data Breach
The HHS is investigating whether protected health information was compromised in the Change Healthcare data breach.
March 14th, 2024Source

Hackers Hiding Keylogger, RAT Malware in SVG Image Files
Threat actors are hiding malware in SVG image files to evade detection and deliver ransomware, download a banking Trojan and distribute malware.
March 14th, 2024Source or Source or Source or Source

Halo Security Dark Web Monitoring identifies and mitigates potential exposures
Halo Security intoduced its new Dark Web Monitoring feature. This addition further enhances the company’s external security platform, allowing security teams to gain insights into potential threats originating from the dark web.
March 14th, 2024Source

HHS opens investigation into UnitedHealth cyberattack
Following a cyberattack on one of the nation's largest health insurers that's thrown health care payments into disarray and likely exposed reams of private patient data, the U.S. Department of Health and Human Services said Wednesday it has begun an investigation into the incident.
March 14th, 2024Source

Immutability: A boost to your security backup
As the volume of data continues to increase and the threat landscape continues to evolve, it is increasingly important for organizations to protect backup data from unwanted deletion. Threats today can take the form of a malicious insider deleting backup data or a targeted cyberattack on the backups themselves.
March 14th, 2024Source

LockBit ransomware kingpin gets 4 years behind bars
Canadian-Russian said to have turned to a life of cybercrime during pandemic, now must pay the price – literally
March 14th, 2024Source

Maybe It’s a Health Care Election After All
Julie Rovner is chief Washington correspondent and host of KFF Health News’ weekly health policy news podcast, “What the Health?” A noted expert on health policy issues, Julie is the author of the critically praised reference book “Health Care Politics and Policy A to Z,” now in its third edition.
March 14th, 2024Source

Microsoft’s AI-Powered Copilot for Security Set for Worldwide Release
Microsoft announces that its Copilot for Security generative AI security solution will become generally available on April 1.
March 14th, 2024Source

Nissan confirms ransomware attack exposed data of 100,000 people
Nissan Oceania is warning of a data breach impacting 100,000 people after suffering a cyberattack in December 2023 that was claimed by the Akira ransomware operation.
March 14th, 2024Source

Nissan Data Breach Affects 100,000 Individuals
Nissan is notifying roughly 100,000 individuals of a data breach resulting from a ransomware attack conducted by the Akira cybercrime group.
March 14th, 2024Source

Perception Point GPThreat Hunter allows cybersecurity experts to focus on in-depth investigations
Perception Point launched its latest innovation, GPThreat Hunter, an addition to the company’s comprehensive security stack.
March 14th, 2024Source

Planning for Healthcare IT Resiliency on a Regional Basis
It's critical for hospitals and other firms to not only prepare for how they will respond to a cyberattack, but also consider the regional impact if a neighboring provider of services needed in the community is disrupted by a serious cyber incident, said Margie Zuk of Mitre.
March 14th, 2024Source or Source or Source or Source or Source

PoC for critical Arcserve UDP vulnerabilities published (CVE-2024-0799, CVE-2024-0800)
Arcserve has fixed critical security vulnerabilities (CVE-2024-0799, CVE-2024-0800) in its Unified Data Protection (UDP) solution that can be chained to upload malicious files to the underlying Windows system.
March 14th, 2024Source

QuProtect Core Security secures Cisco routers against quantum threats
QuSecure unveiled QuProtect Core Security, a product designed to fortify existing Cisco router-to-router communications against emerging quantum threats.
March 14th, 2024Source

Shadow AI – Should I be Worried?
Overzealous policies and blanket bans on AI tools risk forcing users underground to use unknown tools with unknown consequences.
March 14th, 2024Source

Some QNAP NAS devices affected by a critical vulnerability, updates available right now
The company is once again scrambling to improve security of its network OSes
March 14th, 2024Source

StopCrypt: Most widely distributed ransomware evolves to evade detection
A new variant of StopCrypt ransomware (aka STOP) was spotted in the wild, employing a multi-stage execution process that involves shellcodes to evade security tools.
March 14th, 2024Source

Study exposes failings of measures to prevent illegal content generation by text-to-image AI models
Researchers at NYU Tandon School of Engineering have revealed critical shortcomings in recently-proposed methods aimed at making powerful text-to-image generative AI systems safer for public use.
March 14th, 2024Source

UK Council's Vision: Set High Standards in Cybersecurity
Six years after it was founded, the government-backed U.K. Cyber Security Council is taking a multipronged approach to building professionalism in the industry. Board Chair Claudia Natanson discussed the council's journey, its role in shaping industry standards and efforts to foster diversity and narrow the skills gap.
March 14th, 2024Source or Source or Source or Source or Source

US to probe Change Healthcare's data protection standards as lawsuits mount
Services slowly coming back online but providers still struggling
March 14th, 2024Source

Why HHS' Cybersecurity Goals Aren't Necessarily Voluntary
Healthcare sector entities need to focus their attention on meeting the "voluntary" essential and enhanced cybersecurity performance goals set out by federal regulators before those recommendations become regulatory mandates, said Kate Pierce, virtual information security officer at Fortified Heath Security.
March 14th, 2024Source or Source or Source or Source or Source

Zscaler Acquires Avalor for $350 Million
Zscaler acquires Avalor, a risk management platform powered by Data Fabric for Security, for $350 million.
March 14th, 2024Source

Zscaler buys Avalor to bring more AI into its security tools
Zscaler, a cloud security company with headquarters in San Jose, California, has acquired cybersecurity startup Avalor 26 months after its founding, reportedly for $310 million in cash and equity.
March 14th, 2024Source or Source or Source

Internet — Security Issues — March 11th, 2024

British Library pushes the cloud button, says legacy IT estate cause of hefty rebuild
Five months in and the mammoth post-ransomware recovery has barely begun
March 11th, 2024Source

Broadcom Merges Symantec and Carbon Black Into New Business Unit
Fresh off its $69 billion acquisition of VMware, Broadcom creates an Enterprise Security Group unit that merges Symantec and Carbon Black.
March 11th, 2024Source

Critical Considerations for AI Developments in Healthcare
Artificial intelligence has enormous potential for transforming and reimagining all aspects of healthcare but mitigating the risks requires a collaborative, comprehensive approach that prioritizes data security, regulatory compliance and ethical considerations, said Sunil Dadlani, CIO and CISO at Atlantic Health System.
March 11th, 2024Source or Source or Source or Source or Source

Cynerio extends Healthcare Cybersecurity Platform to improve patient data protections
As data breaches continue to expose sensitive healthcare information, with over 118 million patients impacted in the United States in 2023, Cynerio has extended its commitment to enhancing cybersecurity in the healthcare sector.
March 11th, 2024Source

Equilend warns employees their data was stolen by ransomware gang
New York-based securities lending platform EquiLend Holdings confirmed in data breach notification letters sent to employees that their data was stolen in a January ransomware attack.
March 11th, 2024Source

EU’s use of Microsoft 365 found to breach data protection rules
A lengthy investigation into the European Union’s use of Microsoft 365 has found the Commission breached the bloc’s data protection rules through its use of the cloud-based productivity software.
March 11th, 2024Source

If your Business Needs Cybersecurity, you Should Become the Expert
Cybercrime is more rampant than ever these days, and it’s not just big companies that need to worry about it. Individuals and small businesses owe it to themselves to invest in cybersecurity, too.
March 11th, 2024Source

Italian Data Regulator Launches Probe Into OpenAI's Sora
The Italian data protection regulator opened a privacy inquiry to Sora, OpenAI's newly announced text-to-video artificial intelligence model.
March 11th, 2024Source or Source or Source or Source or Source

Kremlin accuses America of plotting cyberattack on Russian voting systems
Don't worry, we have a strong suspicion Putin's still gonna win
March 11th, 2024Source

Microsoft: Russian hackers accessed internal systems, code repositories
Midnight Blizzard (aka APT29), a group of Russian hackers tied to the country’s Foreign Intelligence Service (SVR), has leveraged information stolen from Microsoft corporate email systems to burrow into the company’s source code repositories and internal systems.
March 11th, 2024Source

Okta says data leaked on hacking forum not from its systems
Okta denies that its company data was leaked after a threat actor shared files allegedly stolen during an October 2023 cyberattack on a hacker forum.
March 11th, 2024Source

Possibly Exploited Fortinet Flaw Impacts Many Systems, but No Signs of Mass Attacks
150,000 systems possibly impacted by the recent Fortinet vulnerability ​​CVE-2024-21762, but there is still no evidence of widespread exploitation.
March 11th, 2024Source

Recent TeamCity Vulnerability Exploited in Ransomware Attacks
Servers impacted by recently patched TeamCity vulnerability CVE-2024-27198 targeted in ransomware attacks and abused for DDoS.
March 11th, 2024Source

Researchers expose Microsoft SCCM misconfigs usable in cyberattacks
Security researchers have created a knowledge base repository for attack and defense techniques based on improperly setting up Microsoft's Configuration Manager, which could allow an attacker to execute payloads or become a domain controller.
March 11th, 2024Source

SecurityWeek Cyber Insights 2024 Series
SecurityWeek talks to hundreds of industry experts from dozens of companies covering seven primary topics.
March 11th, 2024Source

Software Reliability Firm Steadybit Raises $6 Million
Steadybit was founded in 2019 and has now raised a total of $13.8 million in funding.
March 11th, 2024Source

The best security keys you can buy: Expert tested
We tested the best security keys that can help keep your online accounts safe from hackers and phishing attacks.
March 11th, 2024Source

UK Conservatives Say 'No' to Cyber Insurance Backstop
The Conservative government of British Prime Minister Rishi Sunak says it won't champion a reinsurance plan for cyber insurance similar to flood insurance, telling a parliamentary committee that it believes government action would "damage competition."
March 11th, 2024Source or Source or Source or Source or Source

Ultimate Member Plugin Flaw Exposes 100,000 WordPress Sites to Attacks
A high-severity XSS vulnerability in the Ultimate Member plugin allows attackers to inject scripts into WordPress sites.
March 11th, 2024Source

Why Wiz Is Pursuing Its 2nd Massive Funding Round in 2 Years
Just a year after becoming the world's most valuable venture-backed cybersecurity company, Wiz is back at it again.
March 11th, 2024Source

Internet — Security Issues — March 8th, 2024

Banning Ransom Payments: Calls Grow to 'Figure Out' Approach
How might banning ransomware victims from paying a ransom to their attacker work in practice?
March 8th, 2024Source or Source or Source or Source or Source

Change Healthcare registers pulse after crippling ransomware attack
Remaining services are expected to return in the coming weeks after $22M ALPHV ransom
March 8th, 2024Source

Chinese Cyberspies Target Tibetans via Watering Hole, Supply Chain Attacks
Chinese APT Evasive Panda compromises a software developer’s supply chain to target Tibetans with malicious downloaders.
March 8th, 2024Source

CISA Outlines Efforts to Secure Open Source Software
Concluding a two-day OSS security summit, CISA details key actions to help improve open source security.
March 8th, 2024Source

Cisco patches Secure Client VPN flaw that could reveal authentication tokens (CVE-2024-20337)
Cisco has fixed two high-severity vulnerabilities affecting its Cisco Secure Client enterprise VPN and endpoint security solution, one of which (CVE-2024-20337) could be exploited by unauthenticated, remote attackers to grab users’ valid SAML authentication token.
March 8th, 2024Source

Cybercrime crew Magnet Goblin bursts onto the scene exploiting Ivanti holes
Plus: CISA pulls plug on couple of systems feared compromised
March 8th, 2024Source

Defense Unicorns Raises $35 Million for National Security Software Solutions
Sapphire Ventures and Ansa Capital have invested $35 million in national security systems software startup Defense Unicorns.
March 8th, 2024Source

Identiv releases bitse.io 3.0, simplifying the deployment of IoT applications
Identiv launched bitse.io 3.0, the latest iteration of its global IoT connecting cloud platform. The updated platform offers advanced features designed to transform applications in supply chain management, brand protection, and customer engagement.
March 8th, 2024Source

In SOTU, Biden Calls for Ban on AI Voice Impersonations
US President Urges Congress to Harness AI While Protecting 'From Its Peril'
March 8th, 2024Source or Source or Source or Source or Source or Source

Is there a better way of protecting your digital life? [Q&A]
The nature of the modern world means that we all have lots of different accounts to manage various services.
March 8th, 2024Source

ISMG Editors: Our Pledge to You in a New Era of Journalism
In the latest weekly update, Information Security Media Group editors discussed the cyberattack at Change Healthcare that's sending shock waves through the U.S. healthcare sector, Palo Alto's strategic pivot and its far-reaching implications for the industry, and new developments in tech and journalism at ISMG.
March 8th, 2024Source or Source or Source or Source or Source

Microsoft falls victim to yet another deceitful exploit by cybercriminals in less than 2 months
Russian hackers gain access to Microsoft's source code and internal systems.
March 8th, 2024Source

Russian state-sponsored hackers compromised Microsoft source code repositories
The previously disclosed attack is worse than initially thought - and it's ongoing
March 8th, 2024Source

Microsoft says Kremlin-backed hackers accessed its source and internal systems
Midnight Blizzard is now using stolen secrets in follow-on attacks against customers.
March 8th, 2024Source

Microsoft Says Russian Gov Hackers Stole Source Code After Spying on Executive Emails
Microsoft says the Midnight Blizzard APT group may still be poking around its internal network after stealing source code, spying on emails.
March 8th, 2024Source

Microsoft says Russian hackers breached its systems, accessed source code
Microsoft says the Russian 'Midnight Blizzard' hacking group recently accessed some of its internal systems and source code repositories using authentication secrets stolen during a January cyberattack.
March 8th, 2024Source

Microsoft says Russian hackers stole source code after spying on its executives
Microsoft’s nation-state security incident continues to be a headache for the company.
March 8th, 2024Source

NIST Cybersecurity Framework: A Cheat Sheet for Professionals
The US National Institute of Standards and Technology's framework defines federal policy, but it can be used by private enterprises, too. Here's what you need to know.
March 8th, 2024Source

Password-cracking botnet has taken over WordPress sites to attack using the visitor's browser
Researcher Denis Sinegubko concludes that 41,800 passwords are being attempted per-site.
March 8th, 2024Source

Quantum Attack Protection Added to HP Business PCs
An upgraded ESC security chip makes the firmware of several HP business PCs resilient to quantum computer attacks.
March 8th, 2024Source

Reach Security Raises $20M to Help Manage Cybersecurity Products
California startup banks $20 million Series A financing for technology to help businesses manage the maze of security tools and products.
March 8th, 2024Source

Russian spies keep hacking into Microsoft in ‘ongoing attack,’ company says
On Friday, Microsoft said Russian government hackers continue to break into its systems using information obtained during a hack last year. This time, the Russian hackers dubbed Midnight Blizzard have targeted Microsoft’s source code and other internal systems, the company said.
March 8th, 2024Source

Russian State Hackers Penetrated Microsoft Code Repositories
A Russian state hack against Microsoft was more serious than initially supposed, Microsoft acknowledged in a Friday disclosure to federal regulators.
March 8th, 2024Source or Source or Source or Source or Source

Russian state-sponsored hackers keep trying to infiltrate Microsoft
They’ve targeted the company’s source code and other internal systems.
March 8th, 2024Source

Some Change Healthcare IT Services Will Be Back by Mid-March
UnitedHealth Group expects certain key IT systems and services affected by the Feb. 21 cyberattack on its Change Healthcare unit to begin regaining functionality over the next week to 10 days. As of now, pharmacy services, such as electronic prescribing with claims submission and payment transmissions, have been restored.
March 8th, 2024Source or Source or Source

Spyware makers express concern after US sanctions spyware veteran
In announcing the sanctions, U.S. Treasury officials accused Dilian and Hamou of developing and selling spyware that was then used to target Americans, including U.S. government employees, as well as policy experts and journalists — actions that enabled human rights violations around the world.
March 8th, 2024Source

State AGs Send Letter to Meta Asking It to Take ‘Immediate Action’ on User Account Takeovers
A group of 40 state attorneys general have sent a letter to Meta expressing concern over Facebook and Instagram account takeovers.
March 8th, 2024Source

Swiss cheese security? Play ransomware gang milks government of 65,000 files
Classified docs, readable passwords, and thousands of personal information nabbed in Xplain breach
March 8th, 2024Source

UK Lawmakers Reject Privacy Limits for Bulk Data Collection
A last-ditch attempt by British lawmakers to amend a bill expanding electronic communication interception by the U.K. intelligence agencies failed despite concerns over pervasive surveillance.
March 8th, 2024Source or Source or Source or Source or Source

Unpatched Sceiner Smart Lock Vulnerabilities Allow Hackers to Open Doors
Multiple vulnerabilities in Sceiner firmware allow attackers to compromise smart locks and open doors.
March 8th, 2024Source

White House Advisory Team Backs Cybersecurity Tax Incentives
The federal government should extend tax incentives to critical infrastructure owners and operators as part of an effort to drive enhanced cybersecurity, a White House advisory board recommended Thursday.
March 8th, 2024Source or Source or Source or Source or Source

Internet — Security Issues — March 6th, 2024

Apple Fixes iOS Kernel Zero-Days Being Exploited in the Wild
Apple pushed out an emergency security update for two critical zero-day flaws that attackers are using to carry out memory corruption attacks on iPhone and iPad devices.
March 6th, 2024Source or Source or Source

Apple fixes two actively exploited iOS zero-days (CVE-2024-23225, CVE-2024-23296)
Apple has fixed two iOS zero-day vulnerabilities (CVE-2024-23225, CVE-2024-23296) exploited by attackers in the wild.
March 6th, 2024Source

BlackCat Ransomware Gang Suspected of Pulling Exit Scam
The BlackCat ransomware gang announces shutdown as an affiliate accuses theft of $22 million ransom payment.
March 6th, 2024Source

Canada's anti-money laundering agency offline after cyberattack
The Financial Transactions and Reports Analysis Centre of Canada (FINTRAC) has announced that a "cyber incident" forced it to take its corporate systems offline as a precaution.
March 6th, 2024Source

Capita says 2023 cyberattack costs a factor as it reports staggering £100M+ loss
Additional cuts announced, sparking fears of further layoffs
March 6th, 2024Source

Cisco Releases Open Source Backplane Traffic Visibility Tool for OT
Cisco has released an open source PoC tool named Badgerboard designed for improved backplane network visibility for OT.
March 6th, 2024Source or Source or Source or Source

Cloud Security Firm Sweet Security Raises $33 Million, 6 Months After Emerging From Stealth
Sweet Security announces a $33 million Series A funding round just six months after emerging from stealth with an initial $12 million seed funding.
March 6th, 2024Source

Cloudflare Boosts Cloud Connectivity with Nefeli Acquisition
Cloudflare purchased a multi-cloud networking startup founded by a former Cisco executive to enable better network and security management within the cloud.
March 6th, 2024Source or Source or Source or Source or Source or Source

Cloudflare Magic Cloud Networking simplifies security and management of public clouds
Cloudflare introduced Magic Cloud Networking, a simple, secure and scalable way for businesses to connect and secure their public cloud environments.
March 6th, 2024Source

Cyber Insights 2024: OT, ICS and IIoT
In an age of increasing geopolitical tensions caused by actual wars, and the threat of Chinese action against Taiwan, OT is a target that cannot be ignored by nation states.
March 6th, 2024Source

Deepwatch increases flexibility with its open security data architecture
Deepwatch introduced its open security data architecture, which provides customers with their choice of cloud and local data sources, including support for a broad range of Security Information and Event Management (SIEM) solutions as well as data lake, XDR, and MDR solutions.
March 6th, 2024Source

DPRK Hackers Breach South Korean Chipmakers, Steal Designs
South Korean intelligence has alluded to North Korean cyber actors conducting a series of attacks targeting the country's leading semiconductor manufacturing companies. Suspected nation-state actors accessed sensitive product designs and photos of production facilities - information that could help the regime modernize its chip-making capabilities for military applications.
March 6th, 2024Source or Source or Source or Source or Source

Duvel says it has "more than enough" beer after ransomware attack
Duvel Moortgat Brewery was hit by a ransomware attack late last night, bringing to a halt the beer production in the company's bottling facilities.
March 6th, 2024Source

EU looks to AI to battle cyber threats
The European Union is poised to use artificial intelligence and other tools to create a "cyber shield" protecting critical infrastructure and sectors from threats, officials said Wednesday.
March 6th, 2024Source

Europe Vows to Unify the Fight Against Cyberthreats
The European Parliament and the council of direct European national governments reached a political agreement Tuesday on a proposal that seeks to improve the trading bloc's ability to mitigate cyberthreats.
March 6th, 2024Source or Source or Source or Source or Source

False Positives: The Unwanted Side of Antivirus Protection
Have you ever been annoyed by your antivirus software telling you that a perfectly harmless file is infected with malware? That's what we call a false positive, and it can be a real pain in the ASCII. False Positives are not only annoying but can be downright destructive - Personally, while testing a known AV product once - it detected my NTUser.dat as a virus rendering the system unbootable.
March 6th, 2024Source

FBI: Critical infrastructure suffers spike in ransomware attacks
Jump in overall cybercrime reports, $60M-plus reportedly lost to extortionists alone, Feds reckon
March 6th, 2024Source

Fraud Alert vs. Credit Freeze: Which One Should You Use?
Make it more difficult for hackers to open accounts in your name by setting up a fraud alert or freezing your credit.
March 6th, 2024Source

Fresh $100 Million Claroty Funding Brings Total to $735 Million
XIoT cybersecurity company Claroty has raised another $100 million at a reported valuation of $2.5 billion.
March 6th, 2024Source

George Kurtz: There's a Difference Between Price, Total Cost
CEO George Kurtz said Palo Alto Networks' strategy of offering free products won't neutralize CrowdStrike's advantage around total cost of ownership, thanks to superior architecture.
March 6th, 2024Source or Source or Source or Source or Source

Governments not keen on pushing citizen-facing AI services, for obvious reasons
As soon as public sector implements GenAI, someone will do their best to break it... or even flirt with it
March 6th, 2024Source

Hacked WordPress sites use visitors' browsers to hack other sites
Hackers are conducting widescale attacks on WordPress sites to inject scripts that force visitors' browsers to bruteforce passwords for other sites.
March 6th, 2024Source

Hackers impersonate U.S. government agencies in BEC attacks
A gang of hackers specialized in business email compromise (BEC) attacks and tracked as TA4903 has been impersonating various U.S. government entities to lure targets into opening malicious files carrying links to fake bidding processes.
March 6th, 2024Source

Hackers target Docker, Hadoop, Redis, Confluence with new Golang malware
Hackers are targeting misconfigured servers running Apache Hadoop YARN, Docker, Confluence, or Redis with new Golang-based malware that automates the discovery and compromise of the hosts.
March 6th, 2024Source

HHS Aiding Organizations Hit by Change Healthcare Cyberattack
US government lays out actions to assist healthcare providers following the highly disruptive Change Healthcare cyberattack.
March 6th, 2024Source

Lookout introduces SSE solution for mid-market enterprises
Lookout announced an edition of the Lookout Cloud Security Platform, the Company’s Security Service Edge (SSE) solution, that specifically addresses the unique challenges and demands faced by mid-sized enterprises.
March 6th, 2024Source

Metomic provides data security tool for organizations that rely on Slack
Metomic announced Metomic for Slack Enterprise. By partnering with Slack, Metomic gives security teams full visibility and control of sensitive data sent across an organization’s entire Slack workspace.
March 6th, 2024Source

Pathlock CAC helps SAP customers comply with regulations
Pathlock intorduced its SAP application and data security product suite, Cybersecurity Application Controls (CAC).
March 6th, 2024Source

Pentera Cloud empowers security teams to reduce exposure to cloud-native attacks
Pentera launched Pentera Cloud as part of its automated security validation platform to complement its renowned Pentera Core and Surface products.
March 6th, 2024Source

Privacy First and Competition
“Privacy First” is a simple, powerful idea: seeing as so many of today’s technological problems are also privacy problems, why don’t we fix privacy first?
March 6th, 2024Source

Ransomware group scams its partner out of a share of $22 million by faking an FBI takedown
Who said there is "honor among thieves?"
March 6th, 2024Source

Research exposes security, privacy and safety issues in female technology apps used to track fertility, monthly cycles
Experts at Royal Holloway, University of London, Newcastle University, University of London, and ETH Zurich have identified significant security, privacy, and safety issues surrounding FemTech, which can pose a potential threat to users.
March 6th, 2024Source

Sweet Security raises $33 million to identify and address cloud risks
Six months after coming out of stealth, Sweet Security is announcing a $33 million Series A funding round.
March 6th, 2024Source

What Are the Highest-Paying Cybersecurity Specialties?
In today's digital age, new career opportunities have emerged for digital protectors. Given the slope of success for the adversaries, these opportunities will continue to grow and pay more over time. They are not subject to the whims of the general economy or business budgetary trends and for those willing to dedicate their lives to safeguarding the digital corridors we all traverse, the rewards are both tangible and profound.
March 6th, 2024Source or Source or Source or Source or Source

Internet — Security Issues — March 4th, 2024

75+ Tech Checklists to Improve Efficiency
From malware response to cloud storage, every organization can benefit from a checklist to ensure effective and smooth operations.
March 4th, 2024Source

American Express credit cards exposed in third-party data breach
American Express is warning customers that credit cards were exposed in a third-party data breach after a merchant processor was hacked.
March 4th, 2024Source

Akamai App & API Protector enhancements detect and mitigate short DDoS attack bursts
Akamai announced significant additions to its flagship Akamai App & API Protector product, including advanced defenses against sophisticated application-layer distributed denial-of-service (DDoS) attacks.
March 4th, 2024Source

Are You as Competent as You Think You Are?
The Dunning-Kruger Effect and the Truth About How You Evaluate Your Career Skills
March 4th, 2024Source or Source or Source or Source or Source

Best Identity Theft Protection and Monitoring Services for 2024
If you suspect your identity may have been stolen, these identity theft protection services can help you.
March 4th, 2024Source

BlackCat ransomware turns off servers amid claim they stole $22 million ransom
The ALPHV/BlackCat ransomware gang has shut down its servers amid claims that they scammed the affiliate responsible for the attack on Optum, the operator of the Change Healthcare platform, of $22 million.
March 4th, 2024Source

Change Healthcare attack latest: ALPHV bags $22M in Bitcoin amid affiliate drama
No honor among thieves?
March 4th, 2024Source

Cyber security tips for remote work - ITSAP.10.116
When you work in the office, you benefit from the security measures that your organization has in place to protect its networks, systems, devices, and information from cyber threats. Working remotely provides flexibility and convenience. However, remote work can weaken your organization's security efforts and put you at risk if you don't take precautions.
March 4th, 2024Source

Cyolo PRO simplifies remote privileged access in OT environments
Cyolo launched Cyolo PRO (Privileged Remote Operations), a hybrid secure remote access solution for Operational Technology (OT).
March 4th, 2024Source

Darktrace partners with Xage Security to detect threats deep inside IT and OT systems
Darktrace and Xage Security announced a new partnership to help businesses prevent cyberattacks and insider threats in critical environments.
March 4th, 2024Source

Experts Warn of Risks in Memory-Safe Programming Overhauls
They Say Rewriting Software Could Overwhelm Firms and Introduce New Vulnerabilities
March 4th, 2024Source or Source or Source or Source or Source

Fake Ransomware Gang Admits It Made Up Epic Games Hack
Calls itself "professional fraudsters."
March 4th, 2024Source

FCC Employees Targeted in Sophisticated Phishing Attacks
Advanced phishing kit employs novel tactics in attack targeting cryptocurrency platforms and FCC employees.
March 4th, 2024Source

Flipper Zero Co-Founder Talks Lax Security And Amateur Hacking, Teases New Devices
The Flipper Zero, known for its use in widespread shenaniganry, is quite the little hacking device in all actuality. This pint-size hacking device is great for cloning hotel keys, opening garages (or Tesla charging ports), adjusting TVs you lost the remote for, and other hacker-type things, especially on penetration tests, which have recently caught the eye of the Canadian government.
March 4th, 2024Source

German Authorities Take Down 'Crimemarket' Cybercrime Website
With over 180,000 users, Crimemarket was a trading hub for narcotics, cybercrime tools, and crimeware guides.
March 4th, 2024Source

GitHub push protection now on by default for public repositories
GitHub push protection -- a security feature aimed at preventing secrets such as API keys or tokens getting accidentally leaked online -- is being switched on by default for all public repositories.
March 4th, 2024Source

Hackers steal Windows NTLM authentication hashes in phishing attacks
The hacking group known as TA577 has recently shifted tactics by using phishing emails to steal NT LAN Manager (NTLM) authentication hashes to perform account hijacks.
March 4th, 2024Source

Hikvision Patches High-Severity Vulnerability in Security Management System
A high-severity vulnerability in HikCentral Professional could lead to unauthorized access to certain URLs.
March 4th, 2024Source

How to see who viewed your LinkedIn profile
It takes just a few steps.
March 4th, 2024Source

How to stay anonymous on LinkedIn
Yes, people can see if you've viewed their profile on LinkedIn — and you can change that.
March 4th, 2024Source

How Traffic, State, and Organizational Data Help Fortify Your Network
Traffic data is the lifeblood of network security, representing the raw, unfiltered truth of what is happening on the network.
March 4th, 2024Source

Identiv ScrambleFactor provides privacy and security in restricted access environments
Identiv introduces ScrambleFactor, an addition to its high-security physical access control system (PACS) portfolio.
March 4th, 2024Source

Microsoft: Look to Supply Chains, Zero Trust for AI Security
Tech Giant Shares Major Threats, Potential Safeguards for Firms Using AI
March 4th, 2024Source or Source or Source or Source or Source or Source

Mobile-Driven Phishing Spoofs FCC, Cryptocurrency Giants
Researchers Say Hackers Used Fake Login Pages to Trick 100 Victims, Crypto Workers
March 4th, 2024Source or Source or Source or Source or Source

More than 100,000 GitHub repositories found spreading malicious packages
An effective way to compromise the software supply chain with developers' help
March 4th, 2024Source

North Korea hacks two South Korean chip firms to steal engineering data
The National Intelligence Service (NIS) in South Korea warns that North Korean hackers target domestic semiconductor manufacturers in cyber espionage attacks.
March 4th, 2024Source

Optum Offering Financial Aid to Some Providers Hit by Outage
But Hospital Lobby Group Contends Funding Is 'Onerous' and 'Exceedingly' Limited
March 4th, 2024Source or Source or Source or Source or Source

Pentagon Leaker Jack Teixeira Pleads Guilty Under a Deal That Calls for at Least 11 Years in Prison
The 22-year-old Air National Guard member admitted illegally collecting some of the nation's most sensitive secrets and sharing them with other users on Discord.
March 4th, 2024Source

Ransomware ban backers insist thugs must be cut off from payday
Increasingly clear number of permanent solutions is narrowing
March 4th, 2024Source

Ransomware Ring Hits Pharmaceutical Industry, Limiting Drug Access for Millions of Americans
ALPHV, a Russian-speaking ransomware gang, is thought to have disabled a network responsible for directing insurance claims to pharmacies.
March 4th, 2024Source

Remote Stuxnet-Style Attack Possible With Web-Based PLC Malware: Researchers
Researchers demonstrate that remote Stuxnet-style attacks are possible against many modern PLCs using web-based malware.
March 4th, 2024Source

Scientists put forth a smarter way to protect a smarter grid
There's a down side to "smart" devices: They can be hacked.
March 4th, 2024Source

ScreenConnect flaws exploited to drop new ToddlerShark malware
The North Korean APT hacking group Kimsuky is exploiting ScreenConnect flaws, particularly CVE-2024-1708 and CVE-2024-1709, to infect targets with a new malware variant dubbed ToddlerShark.
March 4th, 2024Source

Secure Your API With These 16 Practices With Apache APISIX (Part 2)
Last week, we listed 16 practices to help secure one's APIs and described how to implement them with Apache APISIX. This week, we will look at the remaining practices.
March 4th, 2024Source

Securing software repositories leads to better OSS security
Malicious software packages are found on public software repositories such as GitHub, PyPI and the npm registry seemingly every day.
March 4th, 2024Source

Silobreaker enhances threat intelligence platform with MITRE ATT&CK TTP detection capabilities
Silobreaker announced an integration with MITRE ATT&CK Matrix for Enterprise, Industrial Control Systems (ICS) and Mobile, to help organizations better understand threats associated with malware, threat actors and industries.
March 4th, 2024Source

The growing trend in cyberattacks against the aviation industry [Q&A]
Towards the end of last year the American Airlines pilot union was hit with a ransomware attack. This is just one of a growing number of attacks targeting the aviation sector.
March 4th, 2024Source

White House Recommends Memory-Safe Programming Languages and Security-by-Design
A new report promotes preventing cyberattacks by using memory-safe languages and the development of software safety standards.
March 4th, 2024Source

Zyxel Networks introduces affordable WiFi 7 solution for SMBs
Zyxel Networks has released its NWA130BE -- BE11000 WiFi 7 Triple-Radio NebulaFlex Access Point (AP).
March 4th, 2024Source

Internet — Security Issues — March 3rd, 2024

Georgia's Largest County Is Still Repairing Damage From January Cyberattack
Georgia's largest county is still repairing damage inflicted on its government offices by a cyberattack in January 2024.
March 3rd, 2024Source

Internet — Security Issues — March 2nd, 2024

Hackers target FCC, crypto firms in advanced Okta phishing attacks
A new phishing kit named CryptoChameleon is being used to target Federal Communications Commission (FCC) employees, using specially crafted single sign-on (SSO) pages for Okta that appear remarkably similar to the originals.
March 2nd, 2024Source

ISMG Editors: OpenAI's Response to The New York Times Case
Also: Addressing Scotland's Cybercrime Surge; NOC and SOC Convergence
March 2nd, 2024Source or Source or Source

Pentagon Leak Suspect Jack Teixeira Expected to Plead Guilty in Federal Case
The Air National Guardsman accused of leaking highly classified military documents on social media is expected to plead guilty in his federal case.
March 2nd, 2024Source

Internet — Security Issues — February 28th, 2024

A New Ransomware Gang Claims It Stole Source Code, Passwords And More In Epic Hack
When you get into the ransomware scene, one would think that you want to lay somewhat low while building up a decent reputation before going for the big fish. However, ransomware newcomer Mogilevich is coming out swinging with the claim that it has compromised Epic Games and made off with a good handful of data pertaining to the company.
February 28th, 2024Source

A ransomware group says it has stolen almost 200GB of data from Epic Games (updated)
The group has not posted any evidence supporting its claim
February 28th, 2024Source

Biden executive order aims to stop Russia and China from buying Americans' personal data
The bulk sale of geolocation, genomic, financial and health data will be off-limits to "countries of concern."
February 28th, 2024Source

Biden Executive Order Targets Bulk Data Transfers to China
New Order Tasks Department of Justice With Developing Data Transfer Protections
February 28th, 2024Source or Source or Source or Source or Source

Biden orders crackdown on selling Americans' personal data abroad
The broader issue of data harvesting remains an issue.
February 28th, 2024Source

Chinese Cyberspies Use New Malware in Ivanti VPN Attacks
Chinese threat actors target Ivanti VPN appliances with new malware designed to persist system upgrades.
February 28th, 2024Source

Cloud-focused malware campaigns on the increase
As commercial adoption of cloud technologies continues, cloud-focused malware campaigns have increased in both sophistication and number.
February 28th, 2024Source

Compliance Scorecard​ collaborates with ConnectSecure to automate asset governance
Compliance Scorecard​ and ConnectSecure have joined forces to automate asset governance.
February 28th, 2024Source

Cyber Insights 2024: APIs -- A Clear, Present, and Future Danger
The API attack surface is expanding and API vulnerabilities are growing. AI will help attackers find and exploit API vulnerabilities at scale.
February 28th, 2024Source

Down, Not Out: Russian Hacktivists Claiming DDoS Disruptions
Distributed Denial-of-Service Attacks Decline as Russia-Ukraine War Continues
February 28th, 2024Source or Source or Source or Source or Source

Enterprise workers want more transparency around cybersecurity
The nature of cybersecurity is such that much of the work goes on in the background. People notice when there's a problem but not when there isn't.
February 28th, 2024Source

Epic Games Allegedly Hacked - Targeted for Ransomware
Unconfirmed reports suggest that Epic Games, the company behind Fortnite, may be the target of a ransomware attack by a relatively unknown hacker group called Mogilvich. The group has allegedly leaked information on a darknet site, claiming to have 200GB of sensitive data, including email credentials, passwords, personal identification, financial information, source code, and more.
February 28th, 2024Source

Epic Games: "Zero evidence" we were hacked by Mogilevich gang
Epic Games said they found zero evidence of a cyberattack or data theft after the Mogilevich extortion group claimed to have breached the company's servers.
February 28th, 2024Source

European retailer Pepco loses €15.5 million in phishing (possibly BEC?) attack
Pepco Group has confirmed that its Hungarian business has been hit by a "sophisticated fraudulent phishing attack."
February 28th, 2024Source

Exabeam introduces new features to improve security analyst workflows
Exabeam announced two pioneering cybersecurity features, Threat Center and Exabeam Copilot, to its AI-driven Exabeam Security Operations Platform.
February 28th, 2024Source

Hackers Steal Personal Information From Pharma Giant Cencora
Pharmaceutical solutions provider Cencora discloses a cyberattack that resulted in personal information being stolen from its systems.
February 28th, 2024Source

Has the US Created the Wrong War Machine?
We Need Low-Cost, High-Volume Weapons Systems to Prevail in Future Conflicts
February 28th, 2024Source or Source or Source or Source or Source

HSCC publishes 5-year healthcare cybersecurity strategic plan
Developed over eighteen months by the Cybersecurity Working Group and government partners, the plan is a five-year health industry roadmap for addressing frequent and sophisticated cyber incidents aimed at the sector.
February 28th, 2024Source

IBM says their latest AI-enhanced storage platform can identify ransomware in under a minute
Fight fire with fire
February 28th, 2024Source

Is XDR Enough? The Hidden Gaps in Your Security Net
When evaluating XDR, consider its value based on its ability to reduce complexity and improve threat detection and response times.
February 28th, 2024Source

Japan warns of malicious PyPi packages created by North Korean hackers
Japan's Computer Security Incident Response Team (JPCERT/CC) is warning that the notorious North Korean hacking group Lazarus has uploaded four malicious PyPI packages to infect developers with malware.
February 28th, 2024Source

LockBit ransomware returns to attacks with new encryptors, servers
The LockBit ransomware gang is once again conducting attacks, using updated encryptors with ransom notes linking to new servers after last week's law enforcement disruption.
February 28th, 2024Source

ManageEngine partners with Check Point to help organizations tackle mobile threats
ManageEngine announced the integration between Endpoint Central, its flagship unified endpoint management solution, and Check Point's Harmony Mobile, a mobile threat defense solution, to help IT security teams automate the remediation of mobile threats.
February 28th, 2024Source

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, which could allow for arbitrary code execution. Successful exploitation of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
February 28th, 2024Source

New Ransomware Gang Claims Responsibility for Alleged Epic Games Hack
Epic Games says there is 'zero evidence right now' that Mogilevich is behind the supposed 189GB theft.
February 28th, 2024Source

NinjaOne and SentinelOne integration enhances risk mitigation and IT security
NinjaOne and SentinelOne launched a bi-directional product integration that redefines endpoint protection through the merging of IT operations and security.
February 28th, 2024Source

NIST updates Cybersecurity Framework with Version 2.0
Billed as the first major overhaul in a decade for the National Institute of Standards and Technology's foundational risk management approach, CSF 2.0 has new resources to help organizations better position themselves to mitigate cyber threats.
February 28th, 2024Source

Ransomware resurgence: Tackling the new generation of cyber threats
Sadly, there has never been a better phrase than 'survival of the fittest' to describe cyber criminal groups. They are constantly refining their tactics to cause greater disruption and earn even bigger profits. The ransomware ecosystem is a resilient and lucrative business model, and attacks are causing huge pain for organizations.
February 28th, 2024Source

Report Says Iranian Hackers Targeting Israeli Defense Sector
Hackers Are Leveraging Israel-Hamas War to Carry Out Attacks, Researcher Tells ISMG
February 28th, 2024Source or Source or Source or Source or Source

Rhysida ransomware wants $3.6 million for children's stolen data
The Rhysida ransomware gang has claimed the cyberattack on Lurie Children's Hospital in Chicago at the start of the month.
February 28th, 2024Source

State-sponsored hackers know enterprise VPN appliances inside out
Suspected Chinese state-sponsored hackers leveraging Ivanti Connect Secure VPN flaws to breach a variety of organizations have demonstrated "a nuanced understanding of the appliance", according to Mandiant incident responders and threat hunters.
February 28th, 2024Source

The Role of Penetration Testing in Strengthening Cyber Defenses
Penetration testing strengthens cyber defenses by simulating attacks, identifying vulnerabilities, and enhancing security measures.
February 28th, 2024Source

US Government Urges Cleanup of Routers Infected by Russia's APT28
The US government says Russia's APT28 group compromised Ubiquiti EdgeRouters to run cyberespionage operations worldwide.
February 28th, 2024Source

What EU Antitrust Probe Around Entra ID Means for Microsoft
Rivals Say Microsoft Restricts Competition Around Identity. Will Regulators Agree?
February 28th, 2024Source or Source or Source or Source

What's Next for Carbon Black Now That Broadcom Sale Is Dead?
A Carbon Black-Symantec Marriage Would Combine 2 Low-Growth Endpoint Security Teams
February 28th, 2024SourceSource or Source or Source or Source

White House Issues Executive Order on International Data Protection
A coming White House Executive Order seeks to protect personal information by preventing the mass transfer of Americans' sensitive data to countries of concern.
February 28th, 2024Source

Internet — Security Issues — February 27th, 2024

70% of Australians don't feel in control of their data as companies hide behind meaningless privacy terms
Australian consumers don't understand how companies—including data brokers—track, target and profile them. This is revealed in new research on consumer understanding of privacy terms, released by the non-profit Consumer Policy Research Centre and UNSW Sydney today.
February 27th, 2024Source

67,000 U-Haul Customers Impacted by Data Breach
U-Haul says customer information was compromised in a data breach involving a reservation tracking system.
February 27th, 2024Source

An Approach To Synthetic Transactions With Spring Microservices: Validating Features and Upgrades
Learn how synthetic transactions in fintech help in assuring quality and confidence, validating business functionality post major updates or new features.
February 27th, 2024Source

APT29 revamps its techniques to breach cloud environments
Russian threat actors APT29 are changing their techniques and expanding their targets to access cloud environments, members of the Five Eyes intelligence alliance have warned.
February 27th, 2024Source

Artificial Arms Race: What Can Automation and AI do to Advance Red Teams
The best Red Team engagements are a balanced mix of technology, tools and human operators.
February 27th, 2024Source

AU10TIX KYB solution validates info against global registries and jurisdictions
AU10TIX launched an Know Your Business (KYB) solution that enables companies to know exactly who they are doing business with and avoid potential financial and reputational losses.
February 27th, 2024Source

Bitwarden Secrets Manager integrates with Ansible Playbook
Bitwarden enhanced Bitwarden Secrets Manager by integrating with Ansible Playbook.
February 27th, 2024Source

Black Basta, Bl00dy Ransomware Exploiting Recent ScreenConnect Flaws
The Black Basta and Bl00dy ransomware gangs have started exploiting two vulnerabilities in ConnectWise ScreenConnect.
February 27th, 2024Source

Black Basta, Bl00dy ransomware gangs join ScreenConnect attacks
The Black Basta and Bl00dy ransomware gangs have joined widespread attacks targeting ScreenConnect servers unpatched against a maximum severity authentication bypass vulnerability.
February 27th, 2024Source

Canada's RCMP, Global Affairs Hit by Cyberattacks
Canadian authorities are actively investigating cyberattacks impacting the RCMP network and Global Affairs Canada.
February 27th, 2024Source

Cyber Insights 2024: Quantum and the Cryptopocalypse
Quantum computers are coming, and will defeat current PKE encryption. But this cryptopocalypse is not dependent upon quantum computers — it could happen through other means, at any time.
February 27th, 2024Source

Domains Once Owned by Major Firms Help Millions of Spam Emails Bypass Security
8,800 domains, many once owned by major companies, have been abused to get millions of emails past spam filters as part of SubdoMailing campaign.
February 27th, 2024Source

Elections in the Age of AI
CISOs Discuss AI Scams, Cyberthreats and Election Security Defenses
February 27th, 2024Source or Source or Source or Source or Source

Energy Department Invests $45 Million in 16 Projects to Improve Cybersecurity
The US government makes a $45 million investment in 16 projects to improve cybersecurity across the energy sector.
February 27th, 2024Source

FBI, CISA warn US hospitals of targeted BlackCat ransomware attacks
Today, the FBI, CISA, and the Department of Health and Human Services (HHS) warned U.S. healthcare organizations of targeted ALPHV/Blackcat ransomware attacks.
February 27th, 2024Source

Google Genie lets users generate AI outputs resembling video games
It's not 'Sora for video games,' but it's a step in that direction
February 27th, 2024Source

Groups Warn Health Sector of Change Healthcare Cyber Fallout
Some Researchers Confident ConnectWise ScreenConnect Flaw Was Exploited in Attack
February 27th, 2024Source

Hackers backed by Russia and China are infecting SOHO routers like yours, FBI warns
Six years on, routers remain a favorite post for concealing malicious activities.
February 27th, 2024Source

Hessen Consumer Center says systems encrypted by ransomware
The Hessen Consumer Center in Germany has been hit with a ransomware attack, causing IT systems to shut down and temporarily disrupting its availability.
February 27th, 2024Source

HSCC Issues Cyber 'Call to Action' Plan for Health Sector
5-Year Plan Details How to Raise the Bar on Health Ecosystem's Approach to Cyber
February 27th, 2024Source or Source or Source or Source or Source

Innovative blockchain technology balances privacy with regulatory compliance
In a recent study published in Blockchain: Research and Applications, researchers have developed a protocol called Privacy Pools that enhances privacy on blockchain transactions while complying with regulatory standards.
February 27th, 2024Source

Intel Unveils Next-Gen vPro Platform at MWC 2024
Empowering Business with AI-Driven Productivity and Security
February 27th, 2024Source

Legato Security Ensemble helps organizations prevent breaches
Legato Security launched Ensemble, a security operations platform that is poised to redefine how organizations detect, manage, and respond to threats.
February 27th, 2024Source

Moscow Military Hackers Used Microsoft Outlook Vulnerability
APT28 Used Hacked Ubiquiti Routers for Hashed Password Relay Attacks
February 27th, 2024Source or Source or Source or Source or Source

NIST Cybersecurity Framework 2.0 Officially Released
NIST releases Cybersecurity Framework 2.0, the first major update since the creation of the CSF a decade ago.
February 27th, 2024Source

NIST Releases First Update of its Cybersecurity Framework
After releasing the first version of its Cybersecurity Framework in 2014, the National Institute of Standards and Technology (NIST) has released its first update to the guidance document.
February 27th, 2024Source

NIST releases version 2.0 of cybersecurity framework
The National Institute of Standards and Technology (NIST) has updated the widely used Cybersecurity Framework (CSF), its landmark guidance document for reducing cybersecurity risk. The new 2.0 edition is designed for all audiences, industry sectors and organization types, from the smallest schools and nonprofits to the largest agencies and corporations—regardless of their degree of cybersecurity sophistication.
February 27th, 2024Source

NIST updates Cybersecurity Framework after a decade of lessons
The original was definitely getting a bit long in the tooth for modern challenges
February 27th, 2024Source

Notorious ransomware group launched cyberattack on UnitedHealth Group
A ransomware group known as Blackcat was responsible for launching a cyberattack last week at UnitedHealth Group that resulted in nationwide disruption of prescription orders, Reuters reported Feb. 26.
February 27th, 2024Source

Research introduces new approach for detecting deepfakes
Research published in the International Journal of Ad Hoc and Ubiquitous Computingintroduces a new approach to tackling the challenges posed by deepfake technology, which generates manipulated media content that closely resembles authentic footage.
February 27th, 2024Source

Russian hackers hijack Ubiquiti routers to launch stealthy attacks
Russian military hackers are using compromised Ubiquiti EdgeRouters to evade detection, the FBI says in a joint advisory issued with the NSA, the U.S. Cyber Command, and international partners.
February 27th, 2024Source

PKI Solutions introduces new version of PKI Spotlight
PKI Solutions introduced a new version of PKI Spotlight, a real-time monitoring and alerting system that provides live status, availability, configuration, and security of PKI environments (Microsoft PKI and others) and hardware security modules (HSMs).
February 27th, 2024Source

Top 10 Malware Q4 2023
The Cyber Threat Intelligence (CTI) team at the Multi-State Information Sharing and Analysis Center® (MS-ISAC®)
February 27th, 2024Source

US Gov Says Software Measurability is 'Hardest Problem to Solve'
White House calls for the "timely, complete, and consistent" publication of CVE and CWE data to help solve the security metrics problem.
February 27th, 2024Source

Using multimodal deep learning to detect malicious traffic with noisy labels
The success of a deep learning-based network intrusion detection systems (NIDS) relies on large-scale, labeled, realistic traffic. However, automated labeling of realistic traffic, such as by sand-box and rule-based approaches, is prone to errors, which in turn affects deep learning-based NIDS.
February 27th, 2024Source

VIAVI enhances Observer Sentry's exposure and vulnerability analysis
VIAVI Solutions announced the addition of traffic analysis capabilities to its Observer Sentry Software-as-a-Service-based threat exposure management solution.
February 27th, 2024Source

What Goes Around Comes Back Around, With Chatbots Too
Study Shows Correlation Between Polite Language, Culture and LLM Output
February 27th, 2024Source or Source or Source or Source or Source

White House urges developers to dump C and C++
Biden administration calls for developers to embrace memory-safe programing languages and move away from those that cause buffer overflows and other memory access vulnerabilities.
February 27th, 2024Source

White House: Use memory-safe programming languages to protect the nation
The White House is asking the technical community to switch to using memory-safe programming languages -- such as Rust, Python, Swift, C#, Java, and Go -- to prevent memory corruption vulnerabilities from entering the digital ecosystem.
February 27th, 2024Source

Internet — Security Issues — February 26th, 2024

7 Cyber Safety Tips to Outsmart Scammers
Welcome to the wild west of the digital world where cyber scammers lurk around every pixelated corner. Cybercrime isn't just a futuristic Hollywood plotline, it's a real threat that targets everyone—from wide-eyed kids to seasoned adults and wise grandparents.
February 26th, 2024Source

ALPHV/BlackCat responsible for Change Healthcare cyberattack
US government's bounty hasn't borne fruit as whack-a-mole game goes on
February 26th, 2024Source

API attacks put businesses at risk
Attacks targeting the business logic of APIs made up 27 percent of attacks in 2023, a growth of 10 percent since the previous year. Account takeover (ATO) attacks targeting APIs also increased from 35 percent in 2022 to 46 percent in 2023.
February 26th, 2024Source

Back from the dead: LockBit taunts cops, threatens to leak Trump docs
Officials have until March 2 to cough up or stolen data gets leaked
February 26th, 2024Source

Bitdefender Cryptomining Protection detects malicious cryptojacking attempts
Bitdefender announced Cryptomining Protection, a cryptomining management feature that allows users to both protect against malicious cryptojacking and manage their own legitimate cyptomining initiatives on their Windows PCs.
February 26th, 2024Source

Can AI boost clean energy efforts? Tech and policy leaders discuss solutions in Seattle
U.S. Energy Secretary Jennifer Granholm and Sen. Maria Cantwell met in Seattle on Friday with West Coast tech executives and leaders from national laboratories to strategize partnerships to more quickly and effectively harness artificial intelligence in the pursuit of clean energy.
February 26th, 2024Source

Critical Flaw in Popular 'Ultimate Member' WordPress Plugin
The vulnerability carries a CVSS severity score of 9.8/10 and affects web sites running the Ultimate Member WordPress membership plugin.
February 26th, 2024Source

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways
Tips for mitigating the risks associated with these cyberattacks, which include cloud-environment intrusions, are provided.
February 26th, 2024Source

Cyber Insights 2024: Artificial Intelligence
AI will allow attackers to improve their attacks, and defenders to improve their defense. Over time, little will change — but the battle will be more intense.
February 26th, 2024Source

Cybersecurity Training Not Sticking? How to Fix Risky Password Habits
Organizations recognize the cybersecurity risks posed by their end-users, so they invest in security and awareness training programs to help improve security and mitigate risks. However, cybersecurity training has its limitations, especially when it comes to changing end-users' behavior around passwords.
February 26th, 2024Source

Data watchdog tells off outsourcing giant for scanning staff biometrics despite 'power imbalance'
2,000 employees at 38 facilities had data processed 'unlawfully', ICO says
February 26th, 2024Source

DataVisor introduces fraud and risk solution for financial institutions
DataVisor launched a solution designed to both detect fraud and financial crimes more effectively and to uphold sponsor bank compliance in the face of evolving regulations for Banking-as-a-Service (BaaS) offerings.
February 26th, 2024Source

Is It Always Legal to Record Video and Audio in Your Home? Here's What You Need to Know
When do you have the right to record with a security device in your home, and when is it a privacy violation? These tips will help you stay safe and avoid potential legal problems.
February 26th, 2024Source

'Fake love' crypto scammers ensnare US victims
The "wine trader" wooed her online for months with his flirtatious smile and emoji-sprinkled texts. Then he went for the kill, defrauding the Philadelphia-based tech professional out of $450,000 in a cryptocurrency romance scam.
February 26th, 2024Source

Feds hack LockBit, LockBit springs back. Now what?
The busted ransomware gang leader returns with a promise of vengeance
February 26th, 2024Source

From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements
Open source is a great way to test the waters and define requirements. But when looking at putting a platform into production, an enterprise-ready solution will ensure you can keep up with business demands.
February 26th, 2024Source

Groups Warn Health Sector of Change Healthcare Cyber Fallout
Some Researchers Confident ConnectWise ScreenConnect Flaw Was Exploited in Attack
February 26th, 2024Source or Source or Source or Source

Hackers exploit 14-year-old CMS editor on govt, edu sites for SEO poisoning
Threat actors are exploiting a CMS editor discontinued 14 years ago to compromise education and government entities worldwide to poison search results with malicious sites or scams.
February 26th, 2024Source

How the use of mobile devices is changing the cybersecurity landscape [Q&A]
As consumers and businesses undergo a sea change shift towards mobile interfaces, embracing everything from retail to human resources management, the landscape of mobile security is experiencing a parallel transformation.
February 26th, 2024Source

Intel Edge Platform simplifies development and management of edge AI apps
Intel announced its new Edge Platform, a modular, open software platform enabling enterprises to develop, deploy, run, secure, and manage edge and AI applications at scale with cloud-like simplicity.
February 26th, 2024Source

Joint cyber security advisory warns that Russian state actors are adapting their tactics to access cloud infrastructure
The Communications Security Establishment (CSE) and its Canadian Centre for Cyber Security (Cyber Centre) joined their Five Eyes cyber security partners in issuing a joint advisory detailing tactics used by Russian Foreign Intelligence Service (SVR) actors to gain initial cloud access
February 26th, 2024Source

LoanDepot Ransomware Attack Exposed 16.9 Million Individuals
Lending firm LoanDepot said the personal information of 16.9 million people was stolen in a ransomware attack in early January.
February 26th, 2024Source or Source

LockBit Back Online as Ransomware Gang Continues to Clash with Law Enforcement
LockBit is now running from backup servers and has a new Dark Web presence after their site's recent takedown by the FBI and international partners.
February 26th, 2024Source

LockBit leak site is back online
LockBitSupp, the individual running the LockBit ransomware-as-a-service operation, has made good on one promise: the LockBit leak site is back online on backup domains, with lists of victims expected to be unveiled in the coming days.
February 26th, 2024Source or Source

McAfee Social Privacy Manager helps users keep their posts and personal information more private
McAfee announced the launch of Social Privacy Manager to its McAfee+ product line-up.
February 26th, 2024Source

Nancy Pelosi Creates a Buzz by Buying up Shares in the Cyber Security Company Palo Alto Networks (PANW)
Nancy Pelosi, a household name on the hill and, inarguably, one of the best asset managers in town with a stellar stock-picking record, has set the tongues wagging across the financial community today after disclosing a material position in the cyber security company, Palo Alto Networks.
February 26th, 2024Source

Navigating the 2024 IT landscape: The essential role of governance
This year, IT teams across the globe are facing a tech landscape that's undergoing a major transition. Cybersecurity has emerged as a paramount concern, with escalating threats and sophisticated cyber-attacks posing significant risks to business operations.
February 26th, 2024Source

NetSTAR PhishCompass combats phishing threats
NetSTAR announced an advancement in phish detection technology with the introduction of PhishCompass.
February 26th, 2024Source

Palo Alto Networks empowers customers with integrated private 5G solutions
Palo Alto Networks announced end-to-end private 5G security solutions and services in collaboration with leading Private 5G partners.
February 26th, 2024Source

Pikabot returns with new tricks up its sleeve
After a short hiatus, Pikabot is back, with significant updates to its capabilities and components and a new delivery campaign.
February 26th, 2024Source

Ransomware attack blamed for Change Healthcare outage stalling US prescriptions
An ongoing cyberattack at U.S. health tech giant Change Healthcare that sparked outages and disruption to hospitals and pharmacies across the U.S. for the past week was caused by ransomware, TechCrunch has learned.
February 26th, 2024Source

Ransomware Operation LockBit Relaunches Dark Web Leak Site
After Operation Cronos, LockBit Leader LockBitSupp Vows to Continue Hacking
February 26th, 2024Source or Source or Source or Source or Source

Researchers say easy-to-exploit security bugs in ConnectWise remote-access software now under mass attack
Security researchers say a pair of easy-to-exploit flaws in a popular remote-access tool used by more than a million companies around the world are now being mass exploited, with hackers abusing the vulnerabilities to deploy ransomware and steal sensitive data.
February 26th, 2024Source

Russian Cyberspies Targeting Cloud Infrastructure via Dormant Accounts
US government and allies expose TTPs used by notorious Russian hacking teams and warn of the targeting of dormant cloud accounts.
February 26th, 2024Source

Russian hackers shift to cloud attacks, US and allies warn
Members of the Five Eyes (FVEY) intelligence alliance warned today that APT29 Russian Foreign Intelligence Service (SVR) hackers are now switching to attacks targeting their victims' cloud services.
February 26th, 2024Source

Russian Threat Actor APT29 Pivots to the Cloud for Espionage
Five Eyes Cyber Agencies Say Kremlin Hackers Are Following Victims to the Cloud
February 26th, 2024Source or Source or Source or Source or Source

Privacy Watchdog Cracks Down on Biometric Employee Tracking
Leisure Center Operators Ordered to Stop Using Facial and Fingerprint Recognition
February 26th, 2024Source or Source or Source or Source or Source

ScreenConnect flaws exploited to deliver all kinds of malware (CVE-2024-1709, CVE-2024-1708)
The recently patched vulnerabilities (CVE-2024-1709, CVE-2024-1708) in ConnectWise ScreenConnect software are being exploited by numerous attackers to deliver a variety of malicious payloads.
February 26th, 2024Source

State-Sponsored Group Blamed for Change Healthcare Breach
UnitedHealth Group is blaming a state-sponsored threat actor for a disruptive cyberattack on its subsidiary Change Healthcare.
February 26th, 2024Source

The Art of Ethical Hacking: Securing Systems in the Digital Age
Ethical hacking utilizes techniques for positive purposes, safeguarding digital systems from cyber threats by identifying vulnerabilities before malicious hackers.
February 26th, 2024Source

Web Application Security: The Ultimate Guide to Coding Best Practices
Explore best practices and core considerations for writing secure code across web applications in this all-encompassing guide.
February 26th, 2024Source

White House urges devs to switch to memory-safe programming languages
The White House Office of the National Cyber Director (ONCD) urged tech companies today to switch to memory-safe programming languages, such as Rust, to improve software security by reducing the number of memory safety vulnerabilities.
February 26th, 2024Source or Watch Video

Internet — Security Issues — February 25th, 2024

LockBit ransomware returns, restores servers after police disruption
The LockBit gang is relaunching its ransomware operation on a new infrastructure less than a week after law enforcement hacked their servers, and is threatening to focus more of their attacks on the government sector.
February 25th, 2024Source

NBA Top Shot NFT scam promoted by hacked ESPN reporter's X account
"There is NO Free Airdrop happening on NBA Top Shot at this time."
February 25th, 2024Source

Ransomware Operation LockBit Relaunches Dark Web Leak Site
After Operation Cronos, LockBit Leader LockBitSupp Vows to Continue Hacking
February 25th, 2024Source or Source or Source or Source or Source

RCMP investigating cyber attack as its website remains down
The Royal Canadian Mounted Police (RCMP), Canada's national police force has disclosed that it recently faced a cyber attack targeting its networks.
February 25th, 2024Source

Security is hard because it has to be right all the time? Yeah, like everything else
It takes only one bottleneck or single point of failure to ruin your week
February 25th, 2024Source

Internet — Security Issues — February 24th, 2024

How to remove your address from the Internet
It's 2024 and "doxxing" has become a daily occurrence. Our own personal data is out there on the Internet — collected by apps and services, bought out by data brokers, and re-sold to the highest bidder.
February 24th, 2024Source

Internet — Security Issues — February 23rd, 2024

40 Countries Vow Not to Pay Ransomware Hackers
In a gathering of 48 countries for the third annual International Counter Ransomware Initiative summit, the U.S. and allies are pledging to not pay ransomware attacks leveraged against their individual countries.
February 23rd, 2024Source

230k Individuals Impacted by Data Breach at Australian Telco Tangerine
Tangerine Telecom says attackers stole the personal information of 230,000 individuals from a legacy customer database.
February 23rd, 2024Source

A type of cyberattack that could set your smartphone on fire using its wireless charger
A team of security experts at the University of Florida working with security audit company CertiK has found that a certain class of cyberattacks could cause a smartphone to catch fire via its wireless charger.
February 23rd, 2024Source

A Vulnerability in Apache OFBiz Could Allow for Remote Code Execution
A vulnerability has been discovered in the Apache OFBiz, which could allow for remote code execution. Apache OFBiz is an open source product for the automation of enterprise processes. It includes framework components and business applications for ERP, CRM, E-Business/E-Commerce, Supply Chain Management and Manufacturing Resource Planning. Successful exploitation could allow for remote code execution in the context of the Server.
February 23rd, 2024Source

AI Will Lead to Increase in Ransomware
With the growth of AI-based technologies, cybersecurity experts are warning about the upcoming increase in attack attempts and complexity, as cybercriminals increase their use of available tools.
February 23rd, 2024Source

Apple Shortcuts Vulnerability Exposes Sensitive Information
High-severity vulnerability in Apple Shortcuts could lead to sensitive information leak without user's knowledge.
February 23rd, 2024Source

Attackers Rush to Exploit ScreenConnect Vulnerabilities
Ransomware, Info Stealers, Backdoors and Cryptojacking
February 23rd, 2024Source or Source

Avast ordered to pay $16.5 million for misuse of user data
The Federal Trade Commission will require software provider Avast to pay $16.5 million and prohibit the company from selling or licensing any web browsing data for advertising purposes to settle charges that the company and its subsidiaries sold such information to third parties after promising that its products would protect consumers from online tracking.
February 23rd, 2024Source or Source

'Azure AI Content Safety' Service Targets Developer Online Environments
Microsoft shipped an Azure AI Content Safety service to help AI developers build safer online environments.
February 23rd, 2024Source

Binance Restricts 85 LockBit Crypto Wallets
Authorities Uncover 30,000 LockBit Bitcoin Addresses
February 23rd, 2024Source or Source or Source or Source or Source

Change Healthcare Cyber Outage Disrupts Firms Nationwide
HHS Issues Special Alert Urging Providers and Contractors to 'Stay Vigilant'
February 23rd, 2024Source or Source

Change Healthcare Outage Hits Military Pharmacies Worldwide
ConnectWise Denies Speculation That Hack Involved the ScreenConnect Flaw Exploit
February 23rd, 2024Source

CISA Offers Free 'Logging Made Easy' Tool for Diagnosing Threats
LME is a bundle of free and open source software for organizations lacking a security operations center or security information and event management (SIEM) solution, as well as lacking the security knowledge and expertise to set up an intrusion detection system, per its GitHub description.
February 23rd, 2024Source

Defending against distributed denial of service (DDoS) attacks -- ITSM.80.110
As technology evolves, distributed denial of service (DDoS ) attacks are becoming more sophisticated and widespread. These attacks, commonly used by cybercriminals, can cause significant financial, operational, and reputational damage to organizations worldwide. Regardless of the type of DDoS attack, the main goal is always to overwhelm and incapacitate targeted servers, services, or networks by flooding them with malicious traffic from compromised devices or networks.
February 23rd, 2024Source

Enabling Compliance and Security in AI-Driven, Low-Code/No-Code Development
Low-code/no-code development offers a lot of opportunities for companies across sectors, but it can also bring new security risks and compliance concerns.
February 23rd, 2024Source

Exploring the Nexus Between DevSecOps and Cybersecurity
Explore the vital connection between development, security practices, and the evolving landscape of cybersecurity here in this blog!
February 23rd, 2024Source

Hackers are exploiting ConnectWise flaws to deploy LockBit ransomware, security experts warn
Security experts are warning that a pair of high-risk flaws in a popular remote access tool are being exploited by hackers to deploy LockBit ransomware — days after authorities announced that they had disrupted the notorious Russia-linked cybercrime gang.
February 23rd, 2024Source

Hackers are hunting celebs. Digital IDs can help — but come with caveats
Decentralised digital identities offer both promise and peril
February 23rd, 2024Source

HHS OCR Tells Congress It Needs More Funding for HIPAA Work
Breaches and Complaints Continue to Soar as Regulatory Duties Increase
February 23rd, 2024Source or Source or Source

In Other News: Spyware Vendor Shutdown, Freenom-Meta Settlement, 232 Threat Groups
Noteworthy stories that might have slipped under the radar: Spyware vendor Variston is reportedly shutting down, Crowdstrike tracks 232 threat actors, Meta and Freenom reach settlement.
February 23rd, 2024Source

Insomniac Games alerts employees hit by ransomware data breach
Sony subsidiary Insomniac Games is sending data breach notification letters to employees whose personal information was stolen and leaked online following a Rhysida ransomware attack in November.
February 23rd, 2024Source

ISMG Editors: The 'New Frontier' of AI and Identity Security
Identity Security Expert Jeremy Grant Discusses Challenges, Innovations and Trends
February 23rd, 2024Source or Source or Source or Source or Source

LockBit ransomware gang has over $110 million in unspent bitcoin
The LockBit ransomware gang received more than $125 million in ransom payments over the past 18 months, according to the analysis of hundreds of cryptocurrency wallets associated with the operation.
February 23rd, 2024Source

Microsoft and OpenAI Collaborate on AI Security, Block State-Sponsored Attackers
Microsoft and OpenAI have shut down five state-sponsored hacking groups that were using OpenAI's large language models (LLMs) "in support of malicious cyber activities," per announcements this week.
February 23rd, 2024Source

Microsoft Defender for Cloud Adds Agentless Virtual Machine Malware Scanning
Microsoft announced on Thursday that it has added agentless malware scanning for servers hosting virtual machines.
February 23rd, 2024Source

Microsoft Disables App Installer Feature Amid Security Concerns
Microsoft on Thursday took steps to safeguard users by disabling the App Installer feature in Windows 10, following the discovery that threat actors were exploiting it to spread malware.
February 23rd, 2024Source

Microsoft Releases Red Teaming Tool for Generative AI
Microsoft releases PyRIT red teaming tool to help identify risks in generative AI through automation.
February 23rd, 2024Source

Microsoft Secure Future Initiative Aims To Address Cybersecurity Problems
Microsoft on Thursday announced a Secure Future Initiative (SFI) approach to dealing with cybersecurity threats.
February 23rd, 2024Source

No Big Reveal: Cops Don't Unmask LockBit's LockBitSupp
After Teasing 'Who Is LockBitSupp,' Cops Say He's 'Engaged With Law Enforcement'
February 23rd, 2024Source or Source or Source

Ofcom Unprepared to Implement UK Online Safety Bill
UK Parliamentary Committee Says the Agency Is Not Likely to Meet the 2025 Deadline
February 23rd, 2024Source or Source

" target="new" rel="noopener" class="RM1">Source

Open-Source Leadership to the European Commission: CRA Rules Pose Tech and Economic Risks to EU
New cybersecurity rules for digital products proposed by the European Commission pose "unnecessary economic and technological risks to the European Union," according to a group of 12 open-source software leadership organizations.
February 23rd, 2024Source

Post-LockBit, How Will the Ransomware Ecosystem Evolve?
With Over $1 Billion in Annual Proceeds, Don't Expect Attackers to Give Up the Life
February 23rd, 2024Source or Source or Source or Source or Source

'SlashAndGrab' ScreenConnect Vulnerability Widely Exploited for Malware Delivery
ConnectWise ScreenConnect vulnerability tracked as CVE-2024-1709 and SlashAndGrab exploited to deliver ransomware and other malware.
February 23rd, 2024Source

Spyware leak offers 'first-of-its-kind' look inside Chinese government hacking efforts
Documents show Chinese hacking firm I-Soon hacked governments around the world
February 23rd, 2024Source

Thanks FedEx, This is Why we Keep Getting Phished
I've been getting a lot of those "your parcel couldn't be delivered" phishing attacks lately and if you're a human with a phone, you probably have been too. Just as a brief reminder, they look like this:
February 23rd, 2024Source

The impact of AI on cybersecurity
The market for AI in cybersecurity is expected to reach more than $133 billion by 2030 according to a new report from Techopedia.
February 23rd, 2024Source

Tips To Help GitHub Admins Prepare A Company For SOC 2 And ISO 27001 Audits
Source code protection is highly important nowadays, and when your data is well protected according to the best standards, it becomes an absolute must.
February 23rd, 2024Source

Toward Better Patching — A New Approach with a Dose of AI
Use of AI to cut through the noise and confusion of the current vulnerability prioritization approaches suggests an exciting future for AI-assisted operations to vulnerability triaging.
February 23rd, 2024Source

UnitedHealth subsidiary Optum hack linked to BlackCat ransomware
A cyberattack on UnitedHealth Group subsidiary Optum that led to an ongoing outage impacting the Change Healthcare payment exchange platform was linked to the BlackCat ransomware group by sources familiar with the investigation.
February 23rd, 2024Source

US FTC Imposes Strict Reporting Mandates for Global Tel*Link
New Reporting Measures Follow Data Breach Affecting Prison Communications Provider
February 23rd, 2024Source or Source or Source or Source

Watch Now: Cloudy With a Chance of Threats: The Active Threat Landscape in the Cloud
Join the webinar to learn about active threats targeting common cloud deployments and what security teams can do to mitigate them.
February 23rd, 2024Source

Internet — Security Issues — February 21st, 2024

Alarming Security Report Warns Of An Unprecedented Surge In Ransomware Attacks
Over the past couple of years, the ransomware industry has exploded leading to millions in lost dollars to cybercriminals extorting businesses to regain access and control of their private data. It was thought to have reached a head when the Biden Administration sought to crack down on the threat at the International Counter Ransomware Summit in 2021.
February 21st, 2024Source

Apple Adds Post-Quantum Encryption to iMessage
Apple unveils PQ3, a new post-quantum cryptographic protocol for iMessage designed to protect communications against quantum computing attacks.
February 21st, 2024Source

Apple is giving iMessage a massive security update
Security so good it rivals the government...allegedly.
February 21st, 2024Source

Beyond Identity Device360 identifies device security risks
Beyond Identity released a new Device360 solution for continuous device security posture management.
February 21st, 2024Source

Biden asks Coast Guard to create an infosec port in a stormy sea of cyber threats
Oh hear us when we cry to thee for those in peril on the sea
February 21st, 2024Source

Biden is boosting cybersecurity at US ports, where online attacks can be more ravaging than storms
President Joe Biden on Wednesday signed an executive order and created a federal rule aimed at better securing the nation's ports from potential cyberattacks.
February 21st, 2024Source

Biden to Sign Executive Order Raising Maritime Cybersecurity
US Coast Guard Will Publish Proposed Rule Establishing Cybersecurity Minimums
February 21st, 2024Source or Source or Source

Breach at Aussie Telecom Tangerine Affects 232,000 Customers
Customer Accounts Were Secured by MFA, But Contractor's Credentials Exposed Data
February 21st, 2024Source or Source or Source or Source or Source

Check Point launches Quantum Force, series of AI-powered firewalls
Check Point introduces Check Point Quantum Force series: a lineup of ten firewalls designed to meet and exceed the stringent security demands of enterprise data centers, network perimeters, campuses, and businesses of all dimensions.
February 21st, 2024Source

ConnectWise Confirms ScreenConnect Flaw Under Active Exploitation
Security experts describe exploitation of the CVSS 10/10 flaw as "trivial and embarrassingly easy."
February 21st, 2024Source

Control Systems Firm PSI Struggles to Recover From Ransomware Attack
German control system solutions provider PSI Software says it is still recovering from a ransomware attack.
February 21st, 2024Source

Cyber Insights 2024: Ransomware
Ransomware insights: When ransomware first appeared, the term became associated with encrypting data. This is a misconception.
February 21st, 2024Source

Cyberattacks follow businesses to the cloud
Cloud intrusions increased by 75 percent overall last year as adversaries set their sights on the cloud through the use of valid credentials.
February 21st, 2024Source

Cybercriminals use identities to target enterprises
A new report from IBM X-Force Threat Intelligence highlights an emerging global identity crisis as cybercriminals double down on exploiting user identities to compromise enterprises worldwide.
February 21st, 2024Source

Cybersecurity and data protection: Does ChatGPT really make a difference?
An analysis published in the Journal for International Business and Entrepreneurship Development has looked at the various approaches to cybersecurity and data protection taken by key global players, namely the European Union (EU), the United States of America (U.S.), and China.
February 21st, 2024Source

Cybersecurity for satellites is a growing challenge as threats to space-based infrastructure grow
In today's interconnected world, space technology forms the backbone of our global communication, navigation and security systems. Satellites orbiting Earth are pivotal for everything from GPS navigation to international banking transactions, making them indispensable assets in our daily lives and in global infrastructure.
February 21st, 2024Source

Discord took no action against server that coordinated costly Mastodon spam attacks
Over the weekend, hackers targeted federated social networks like Mastodon to carry out ongoing spam attacks that were organized on Discord, and conducted using Discord applications. But Discord has yet to remove the server where the attacks are facilitated, and Mastodon community leaders have been unable to reach anyone at the company.
February 21st, 2024Source

Diversifying Defenses: FjordPhantom Malware Shows Importance of a Multi-Pronged Approach
Security teams need to combine the angles of client-side and server-side detection in order to have the best chance of mitigating the risk of advanced mobile malware.
February 21st, 2024Source

Executive Order on Port Cybersecurity Points to IT/OT Threat Posed by Chinese Cranes
A new Biden executive order to boost the cybersecurity of US ports highlights the risks associated with the use of Chinese cranes.
February 21st, 2024Source

Hack at Services Firm Hits 2.4 Million Eye Doctor Patients
As Vendor Breaches Surge, Medical Practices Need 20/20 Visibility on Third Parties
February 21st, 2024Source or Source or Source or Source

Hackers abuse Google Cloud Run in massive banking trojan campaign
Security researchers are warning of hackers abusing the Google Cloud Run service to distribute massive volumes of banking trojans like Astaroth, Mekotio, and Ousaban.
February 21st, 2024Source

How do I remove malware from my PC?
Removing malware from your PC could be simple - or not. Here's everything you need to know.
February 21st, 2024Source

Joomla CMS Patches Critical XSS Vulnerabilities
Millions of Websites Potentially at Risk
February 21st, 2024Source or Source

Law Enforcement Locks Down LockBit Ransomware Group, Arrests 2
The world's biggest ransomware syndicate has swiped more than $120 million from victims like Boeing and the United Kingdom's Royal Mail.
February 21st, 2024Source

LockBit leaks expose nearly 200 affiliates and bespoke data-stealing malware
Operation Cronos's 'partners' continue to trickle the criminal empire's secrets
February 21st, 2024Source

Microsoft expands free logging capabilities after May breach
Microsoft has expanded free logging capabilities for all Purview Audit standard customers, including U.S. federal agencies, six months after disclosing that Chinese hackers stole U.S. government emails undetected in an Exchange Online breach between May and June 2023.
February 21st, 2024Source

Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution.
February 21st, 2024Source

New SSH-Snake malware steals SSH keys to spread across the network
A threat actor is using an open-source network mapping tool named SSH-Snake to look for private keys undetected and move laterally on the victim infrastructure.
February 21st, 2024Source

NSA Announces Retirement of Cybersecurity Director Rob Joyce
NSA says Rob Joyce is retiring as cybersecurity director and will be replaced by David Luber, the current deputy director of cybersecurity.
February 21st, 2024Source

PAM Provider Delinea Buys Fastpath
Acquisition Will Allow Delinea to Detect Overprivileged Access, Company Says
February 21st, 2024Source or Source or Source or Source or Source

Published CVEs predicted to increase by 25 percent in 2024
The total number of common vulnerabilities and exposures (CVEs) is expected to increase by 25 percent in 2024 to 34,888 vulnerabilities, or roughly 2,900 per month.
February 21st, 2024Source

Redis Servers Targeted With New 'Migo' Malware
Attackers weaken Redis instances to deploy the new Migo malware and install a rootkit and cryptominers.
February 21st, 2024Source

Researchers Devise 'VoltSchemer' Attacks Targeting Wireless Chargers
Researchers document VoltSchemer attacks that manipulate power voltage to take over commercial wireless chargers.
February 21st, 2024Source

Researchers warn high-risk ConnectWise flaw under attack is 'embarrassingly easy' to exploit
'I can't sugarcoat it — this shit is bad,' said Huntress' CEO
February 21st, 2024Source

Russia Announces Arrest of Medibank Hacker Tied to REvil
3 Suspects Charged With Using Sugar Ransomware, Phishing Attacks Against Russians
February 21st, 2024Source or Source or Source or Source or Source

Searchlight Cyber integrates MITRE ATT&CK Mapping into DarkIQ for dark web monitoring
Searchlight Cyber has integrated the MITRE ATT&CK Enterprise Framework into its dark web monitoring solution, DarkIQ. Aligning actionable dark web intelligence with a universally understood cybersecurity framework empowers all cybersecurity teams, irrespective of size, to contextualize ongoing threats and respond with recommended mitigations -- further enhancing the value of dark web monitoring for identifying cyberattacks.
February 21st, 2024Source

Should IT and Security Teams Play a Role in Crisis Communications?
Australian IT and security teams should play key roles in communications during outages and cyber attacks; they also need to be prepared to act when such a tech-related crisis occurs.
February 21st, 2024Source

Tech Moves: Expedia taps execs to run new divisions; Bumble hires Microsoft vet as CTO
Alfonso Paredes, who joined Expedia 14 years ago, was named president of Private Label Solutions. Paredes, based in London, was most recently a senior vice president for Expedia Partner Solutions.
February 21st, 2024Source

The Deep Tech revolution -- Part 5: Hackathons
More often than not, hackers tend to get a bad reputation or, at the very least, a controversial one. In pop culture especially, they are usually portrayed either as cyber-criminals attacking organizations for personal gain or, at the very opposite end of the spectrum, using their skills for something positive.
February 21st, 2024Source

US health tech giant Change Healthcare hit by cyberattack
U.S. healthcare technology giant Change Healthcare has confirmed a cyberattack on its systems. In a brief statement Wednesday, the company said it was "experiencing a network interruption related to a cyber security issue."
February 21st, 2024Source

US offers $15 million bounty for info on LockBit ransomware gang
The U.S. State Department is now also offering rewards of up to $15 million to anyone who can provide information about LockBit ransomware gang members and their associates.
February 21st, 2024Source

Vastaamo Hacker Disappears Amid Ongoing Trial
Aleksanteri Kivimaki Vanished After the Court Ordered His Reconfinement
February 21st, 2024Source

VMware pushes admins to uninstall vulnerable, deprecated vSphere plugin (CVE-2024-22245, CVE-2024-22250)
VMware Enhanced Authentication Plug-in (EAP), a plugin for VMware vSphere, has two vulnerabilities (CVE-2024-22245, CVE-2024-22250) that could be exploited by attackers to mount authentication relay and session hijack attacks.
February 21st, 2024Source

Internet — Security Issues — February 19th, 2024

ALPHV gang claims it's the attacker that broke into Prudential Financial, LoanDepot
Ransomware group continues to exploit US regulatory requirements to its advantage
February 19th, 2024Source

Arcitecta enhances Mediaflux Livewire to optimize data movement
Arcitecta announced significant enhancements to its Mediaflux Livewire offering that address the challenges of transmitting data over low-bandwidth and unreliable network connections.
February 19th, 2024Source

Cactus ransomware claim to steal 1.5TB of Schneider Electric data
The Cactus ransomware gang claims they stole 1.5TB of data from Schneider Electric after breaching the company's network last month.
February 19th, 2024Source

Cybersecurity success -- elevate your defense against cyber threats
As cybercrime continues to increase, organizations must consider actions to improve their cyber security and cyber resilience. There are constantly new ransomware and data breach headlines hitting the news, and, according to research, a company falls victim to a cyberattack every 39 seconds.
February 19th, 2024Source

Do Spencer's Vibrators Have Malware on Them? An Investigation
We tested the vibrator that a Spencer's customer claims almost gave their computer malware.
February 19th, 2024Source

Do you need antivirus on Linux?
If you've been a Windows user for years, then you are well aware of the need for antivirus software. It's a given. But does the same hold true for the open-source operating system?
February 19th, 2024Source

How to protect your digital accounts from hackers
Social media, email, retailers, service providers, insurance. For most people, the list of important online accounts is long. Here's how to keep them safe -- and regain control when you're hacked.
February 19th, 2024Source

Improving cloud security model for web applications using hybrid encryption techniques
Research published in the International Journal of Internet Technology and Secured Transactions uses a hybrid approach to boosting the security of online applications, particularly within the realm of cloud computing. By merging two distinct techniques—homomorphic encryption and the squirrel search algorithm (SSA)—the study demonstrates a significant enhancement in the security of cloud computing models.
February 19th, 2024Source

LockBit ransomware disrupted by global police operation
Law enforcement agencies from 10 countries have disrupted the notorious LockBit ransomware operation in a joint operation known as ''Operation Cronos."
February 19th, 2024Source

Log4j lessons learned: A blueprint for zero-day defence
Two years ago, the zero-day vulnerability, known as Log4Shell unwrapped itself spoiling holiday celebrations for many across the globe leaving organizations scrambling for a fix before it could be exploited.
February 19th, 2024Source

New Guides Aim to Help Health Sector Beef Up Cyber, Privacy
HHS OCR, NIST Finalize HIPAA Cyber Guide; HSCC Issues Security, Privacy Resource
February 19th, 2024Source or Source or Source or Source or Source

NIST Offers Concrete Steps for Secure Software Development
New Guidelines Include 'Absolutely Crucial' Steps to Enhance Security, Experts Say
February 19th, 2024Source or Source or Source or Source

North Korean hackers linked to defense sector supply-chain attack
In an advisory today Germany's federal intelligence agency (BfV) and South Korea's National Intelligence Service (NIS) warn of an ongoing cyber-espionage operation targeting the global defense sector on behalf of the North Korean government.
February 19th, 2024Source

Over 28,500 Exchange servers vulnerable to actively exploited bug
Up to 97,000 Microsoft Exchange servers may be vulnerable to a critical severity privilege escalation flaw tracked as CVE-2024-21410 that hackers are actively exploiting.
February 19th, 2024Source

People cannot be patched
When an organization is aware software is vulnerable, it focuses on patching systems to mitigate the risk. Likewise, when security technology becomes outdated, newer versions plug the gaps. However, with people there's no patch or update readily available.
February 19th, 2024Source

Protecting EHR Systems Against Attacks and Compromises
Why Are EHRs So Vulnerable and How Can Organizations Get Better at Protecting Them?
February 19th, 2024Source or Source or Source or Source or Source

Ransomware Experts See Problems With Banning Ransom Payments
Would Criminals Care? Might Victims Still Pay? Would Hospitals Be Exempt?
February 19th, 2024Source or Source or Source or Source or Source

Ransomware Group Takes Credit for LoanDepot, Prudential Financial Attacks
The BlackCat/Alphv ransomware group has taken credit for the LoanDepot and Prudential Financial attacks, threatening to sell or leak data.
February 19th, 2024Source

Research reveals massive failures in US cybersecurity laws
In the world of advancing technology, cyberattacks have been on the rise, causing a potential risk of stolen personal data across 400 million users. In response, governments in all 50 states have introduced breach notification laws (BNLs) mandating that companies notify a consumer if their data has been breached.
February 19th, 2024Source

Russian Cyberspies Exploit Roundcube Flaws Against European Governments
Russian cyberespionage group targets European government, military, and critical infrastructure entities via Roundcube vulnerabilities.
February 19th, 2024Source

Tech Giants Pledge to Curb AI-Made Election Misinformation
AI's Speed and Scale of Deception Is 'Unprecedented,' Says US Senator
February 19th, 2024Source or Source or Source or Source or Source

The best mobile VPNs: Expert tested
ZDNET tested the best mobile VPNs that combine speed, security, and intuitive apps to help you find the right one.
February 19th, 2024Source

The best password managers for 2024
Yes, you need a password manager. But it doesn't have to be overly complex.
February 19th, 2024Source

Ukrainian Extradited to US Over Alleged Raccoon Stealer Ties
Mark Sokolovsky Has Fought Extradition From the Netherlands Since March 2022 Arrest
February 19th, 2024Source or Source or Source or Source

Ukrainian Raccoon Infostealer Operator Extradited to US
Alleged Raccoon Infostealer operator Mark Sokolovsky is awaiting trial in the US, after being extradited from the Netherlands.
February 19th, 2024Source

Internet — Security Issues — February 16th, 2024

A Russian-controlled botnet of hundreds of routers has now been shut down by the US DOJ
Hundreds of routers used in homes and small offices were unknowingly used to spread malware via a Russian-made botnet. This week, the US Department of Justice announced that this botnet has now been shut down in an operation that took place in January 2024 but has now been revealed publicly.
February 16th, 2024Source

Alpha ransomware linked to NetWalker operation dismantled in 2021
Security researchers analyzing the Alpha ransomware payload and modus operandi discovered overlaps with the now-defunct Netwalker ransomware operation.
February 16th, 2024Source

Breach Roundup: Zeus Banking Trojan Leader Pleads Guilty
Also: Polish Prime Minister Says Previous Administration Deployed Pegasus Spyware
February 16th, 2024Source or Source or Source or Source or Source

Cyberint Ransomania empowers organizations to proactively defend against ransomware attacks
Cyberint is unveiling its latest contribution to the infosec community: Ransomania.
February 16th, 2024Source

Cyberwar: What Is It Good For?
CMO Red Curry, CISO Sam Curry on the Effects of Attacks on Critical Infrastructure
February 16th, 2024Source or Source or Source or Source

DOJ quietly removed Russian malware from routers in US homes and businesses
Feds once again fix up compromised retail routers under court order.
February 16th, 2024Source

Draft UN Cybercrime Treaty Could Make Security Research a Crime, Leading 124 Experts to Call on UN Delegates to Fix Flawed Provisions that Weaken Everyone's Security
Security researchers' work discovering and reporting vulnerabilities in software, firmware, networks, and devices protects people, businesses and governments around the world from malware, theft of critical data, and other cyberattacks. The internet and the digital ecosystem are safer because of their work.
February 16th, 2024Source

Eight Vulnerabilities Disclosed in the AI Development Supply Chain
Details of eight vulnerabilities found in the open source supply chain used to develop in-house AI and ML models have been disclosed. All have CVE numbers, one has critical severity, and seven have high severity.
February 16th, 2024Source

Employees tricked into downloading remote monitoring software
New research from Malwarebytes reveals that employees are being tricked into downloading remote monitoring and management tools like AnyDesk to open up back doors to corporate networks.
February 16th, 2024Source

Ex-Employee's Admin Credentials Used in US Gov Agency Hack
A threat actor employed the administrative credentials of a former employee to hack a US government organization.
February 16th, 2024Source

FDA Ramps Up Resources for Medical Device Cybersecurity
FDA's Dr. Suzanne Schwartz on How New 'Super Office' Boosts Agency's Cyber Efforts
February 16th, 2024Source or Source or Source or Source or Source

In Other News: US Hacks Iranian Spy Ship, Rhysida Ransomware Decryption, NIST Guidance
Noteworthy stories that might have slipped under the radar: US hacks Iranian military vessel used for spying, Rhysida ransomware free decryption tool, NIST guidance.
February 16th, 2024Source

ISMG Editors: What Happened to the Cyberwar in Israel?
Also: Potential HIPAA Audit Revival; Security Risks of Sovereign AI
February 16th, 2024Source or Source or Source or Source or Source

Mysterious 'MMS Fingerprint' Hack Used by Spyware Firm NSO Group Revealed
The existence of a previously unknown infection technique used by spyware firm NSO Group is suggested by a single line in a contract between NSO and the telecom regulator of Ghana.
February 16th, 2024Source

Navigating the AI Career Maze
CyberEd.io's Steve King on Job Opportunities Available in Age of AI
February 16th, 2024Source or Source or Source or Source or Source

North Korean hackers now launder stolen crypto via YoMix tumbler
The North Korean hacker collective Lazarus, infamous for having carried out numerous large-scale cryptocurrency heists over the years, has switched to using YoMix bitcoin mixer to launder stolen proceeds.
February 16th, 2024Source

On Point: Identity Fabric Is the Future of Cybersecurity
Improving Security by Integrating IAM Infrastructure, Applications and Services
February 16th, 2024Source or Source or Source or Source or Source

Permit.io Raises $8 Million for Authorization Platform
Tel Aviv startup raises $8 million in Series A funding to help developers add secure access approval flows to applications.
February 16th, 2024Source

Permit.io raises $8 million to simplify app development
Permit.io announced it has raised $8 million in Series A funding, led by Scale Venture Partners, along with NFX, Verissimo Ventures, Roosh Ventures, Firestreak, 92712, and other existing investors, to ensure application developers never have to build permissions again.
February 16th, 2024Source

Research espionage is a real threat—but a drastic crackdown could stifle vital international collaboration
Australia's research institutions are targets for nefarious actors, from China and elsewhere. The Australian Security Intelligence Organisation (ASIO) has publicly tabled an "awareness" of various attempts to compromise the sector.
February 16th, 2024Source

Sophos' Kris Hagerman Steps Down as CEO; Joe Levy Takes Helm
Hagerman Moves to Advisory Role After Leading Company for the Past 12 Years
February 16th, 2024Source or Source or Source or Source or Source

To Avoid Bankruptcy, EMR Firm Settles Lawsuit for $4M
Pediatric Tech Vendor Hit by 2022 Data Breach Affecting 3 Million - Mostly Children
February 16th, 2024Source or Source or Source or Source or Source

U.S. authorities disrupt Russian intelligence's botnet
In January 2024, an operation dismantled a network of hundreds of SOHO routers controlled by GRU Military Unit 26165, also known as APT 28, Sofacy Group, Forest Blizzard, Pawn Storm, Fancy Bear, and Sednit. This network facilitated various crimes, including extensive spearphishing and credential harvesting against entities of interest to the Russian government, such as U.S. and foreign governments, military, and key security and corporate sectors.
February 16th, 2024Source

Ukrainian Extradited to US Over Alleged Raccoon Stealer Ties
Mark Sokolovsky Has Fought Extradition From the Netherlands Since March 2022 Arrest
February 16th, 2024Source or Source or Source or Source or Source

Ukrainian Pleads Guilty in US to Key Role in Zeus, IcedID Malware Operations
Ukrainian national Vyacheslav Igorevich Penchukov has pleaded guilty to holding key roles in the Zeus and IcedID malware operations.
February 16th, 2024Source

Unlocking business potential through outcome-based security [Q&A]
Traditionally, organizations have focused on measuring the results of their cyber security strategies in terms of threat events or security incidents to determine how effective their security controls are.
February 16th, 2024Source

US FTC Proposes Penalties for Deepfake Impersonators
FTC Says It Should Be Able to Sue Providers Who Know Their Tech Is Used for Fraud
February 16th, 2024Source or Source or Source or Source or Source

US Offers $10 Million for Information on BlackCat Ransomware Leaders
The US announces a $10 million reward for information on key members of the Alphv/BlackCat ransomware group.
February 16th, 2024Source

Vulnerabilities in CUSG CMS Exposed Credit Unions to Attacks
Three vulnerabilities in CU Solutions Group CMS exposed 275 credit unions to credential theft, account takeover.
February 16th, 2024Source

What Is a Passphrase? Examples, Types & Best Practices
A passphrase functions as a password, granting you access to a system or application, but instead of a string of random characters, it's a combination of words, numbers and symbols. Passphrases are typically longer than passwords and easier to remember since they can be composed of a series of words or a meaningful phrase.
February 16th, 2024Source

Zeus, IcedID malware kingpin faces 40 years in slammer
Nearly a decade on the FBI's Cyber Most Wanted List after getting banks to empty vics' account
February 16th, 2024Source

Internet — Security Issues — February 14th, 2024

Albanian Authorities Accuse Iranian-Backed Hackers of Cyberattack on Institute of Statistics
Albania's cybersecurity authorities have accused a hacker group "sponsored" by the Iranian government of attacking the country's Institute of Statistics earlier this month.
February 14th, 2024Source

Appdome unveils Geo Compliance suite to thwart spoofing and enhance mobile app security
Appdome unveiled its new Geo Compliance feature set, allowing mobile brands to trust the user's location and detect location spoofing, fake GPS apps, VPN use, SIM swaps and other methods used to circumvent geo restrictions in mobile applications.
February 14th, 2024Source

Armis acquires CTCI to improve pre-attack threat hunting technology
Armis announced it has agreed to acquire CTCI (Cyber Threat Cognitive Intelligence), a privately held company specializing in AI-powered pre-attack threat hunting technology.
February 14th, 2024Source

Asset Management Firm Armis Acquires Honeypot Maker CTCI
Deal Between Private Companies Is Worth About $20 Million
February 14th, 2024Source or Source or Source or Source or Source

Beyond the Hype: Questioning FUD in Cybersecurity Marketing
Could cybersecurity professionals benefit from FUD awareness training in the same way that users benefit from phishing awareness training?
February 14th, 2024Source

Bumblebee malware wakes from hibernation, forgets what year it is, attacks with macros
Trying to break in with malicious Word documents? How very 2015 of you
February 14th, 2024Source

Chipmaker Patch Tuesday: AMD and Intel Patch Over 100 Vulnerabilities
AMD and Intel patch dozens of vulnerabilities on February 2024 Patch Tuesday, including multiple high-severity bugs.
February 14th, 2024Source

Corporate users getting tricked into downloading AnyDesk
Hackers are leveraging the AnyDesk remote desktop application in a phishing campaign targeting employees, Malwarebytes warns.
February 14th, 2024Source

Cyberhaven Linea AI protects vital corporate data
Cyberhaven launched Linea AI, an AI platform designed to combat the most critical insider risks threatening vital corporate data.
February 14th, 2024Source

Data brokers have your personal info. Here's how to wipe it clean
Removing yourself from these databases is an aggravating version of whack-a-mole.
February 14th, 2024Source

Explanation of the Current Alert Level of GUARDED
On February 21, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to vulnerabilities in Mozilla products. On February 21, the MS-ISAC released an advisory for multiple vulnerabilities in Mozilla products, the most severe of which could allow for arbitrary code execution.
February 14th, 2024Source

Europe's AI Act Poised to Become Law After Committees Vote
Act Will Require Developers to Allow a Copyright Holder to Opt Out
February 14th, 2024Source or Source or Source or Source or Source

France Uncovers Russian Disinformation Campaign
'Portal Kombat' Is an Automated Pro-Russian Propaganda Network
February 14th, 2024Source or Source or Source or Source or Source or Source or Source

German battery maker Varta halts production after cyberattack
Battery maker VARTA AG announced yesterday that it was targeted by a cyberattack that forced it to shut down IT systems, causing production to stop at its plants.
February 14th, 2024Source

Google Threat Analysis Group's Spyware Research: How CSVs Target Devices and Applications
A new publication from Google's Threat Analysis Group focuses on commercial surveillance vendors (PDF), whose services are bought by governments for monitoring or spying purposes. Google is currently tracking more than 40 CSVs, most of which are highly technical with the ability to develop spyware and zero-day exploits to compromise their targets, particularly on Android and iOS devices.
February 14th, 2024Source

How are state-sponsored threat actors leveraging AI?
Microsoft and OpenAI have identified attempts by various state-affiliated threat actors to use large language models (LLMs) to enhance their cyber operations.
February 14th, 2024Source

IBM, ISC2 Offer Cybersecurity Certificate
The entry-level IBM and ISC2 Cybersecurity Specialist Professional Certificate takes four months to complete.
February 14th, 2024Source

Is Ransomware Finally in Decline? Groups Are 'Struggling'
Researchers See Waning Mystique, Use of Ghost Groups, Breach Tricks, Trauma of War
February 14th, 2024Source or Source or Source or Source or Source

KeyTrap DNS Attack Could Disable Large Parts of Internet: Researchers
Patches released for a new DNSSEC vulnerability named KeyTrap, described as the worst DNS attack ever discovered.
February 14th, 2024Source

LockBit claims ransomware attack on Fulton County, Georgia
The LockBit ransomware gang claims to be behind the recent cyberattack on Fulton County, Georgia, and is threatening to publish "confidential" documents if a ransom is not paid.
February 14th, 2024Source

LOKKER introduces a feature to notify users if their website breaches various privacy laws
LOKKER introduces a new feature included in its Privacy Edge software suite.
February 14th, 2024Source

Microsoft and OpenAI Collaborate on AI Security, Block State-Sponsored Attackers
Microsoft and OpenAI have shut down five state-sponsored hacking groups that were using OpenAI's large language models (LLMs) "in support of malicious cyber activities," per announcements this week.
February 14th, 2024Source

More Signs of a Qakbot Resurgence
Qakbot Wouldn't Be the First Trojan to Come Back After a Takedown
February 14th, 2024Source or Source or Source or Source or Source

North Korean Hackers Target South Korean President's Office
Attackers Accessed Details of State Visits to UK, France in Private Email Account
February 14th, 2024Source or Source or Source or Source

Prudential Financial Discloses Data Breach
Prudential Financial says administrative and user data was compromised in a cyberattack earlier this month.
February 14th, 2024Source

Prudential Financial finds cybercrims lurking inside its IT systems
Some company admin and customers data exposed, but bad guys were there for 'only' a day
February 14th, 2024Source

Resecurity partners with CyberPeace Foundation to address emerging cyber threats
Resecurity and CyberPeace Foundation have joined forces through a Memorandum of Understanding (MoU) to enhance cybersecurity measures worldwide.
February 14th, 2024Source

Romanian hospital ransomware crisis attributed to third-party breach
Emergency impacting more than 100 facilities appears to be caused by incident at software provider
February 14th, 2024Source

Russian and North Korean hackers used OpenAI tools to hone cyberattacks
State actors were getting help to draft phishing emails and debug code.
February 14th, 2024Source

SAP Patches Critical Vulnerability Exposing User, Business Data
SAP patches a critical code-injection vulnerability in the SAP ABA (Application Basis) cross-application component.
February 14th, 2024Source

Seal Security raises $7.4 million to secure open source with GenAI
Seal Security announced it has emerged from stealth with a $7.4 million seed funding round led by Vertex Ventures Israel, with participation from Crew Capital, PayPal Alumni Fund, and Cyber Club London.
February 14th, 2024Source

South Korea Says Presumed North Korean Hackers Breached Personal Emails of Presidential Staffer
South Korean President Yoon Suk Yeol's office said presumed North Korean hackers breached the personal emails of one of his staff members.
February 14th, 2024Source

Southern Water cyberattack expected to hit hundreds of thousands of customers
Brit utility also curiously disappears from Black Basta leak site
February 14th, 2024Source

They're Back: HHS OCR Plans to Resurrect Random HIPAA Audits
Agency Is Surveying 207 Previously Audited Firms to Prepare for Next Audit Cycle
February 14th, 2024Source or Source or Source or Source

They're Back: HHS OCR Plans to Resurrect Random HIPAA Audits
Agency Is Surveying 207 Previously Audited Firms to Prepare for Next Audit Cycle
February 14th, 2024Source or Source or Source or Source or Source

Top measures to enhance cyber security for small and medium organizations (ITSAP.10.035)
Looking for steps you can take to protect your organization's networks and information from cyber threats? To get you started, we have summarized the 13 security control categories that are identified in our Baseline Cyber Security Controls for Small and Medium Organizations. By implementing these controls, you can reduce your risks and improve your ability to respond to security incidents.
February 14th, 2024Source

Trans-Northern Pipelines investigating ALPHV ransomware attack claims
Trans-Northern Pipelines (TNPI) has confirmed its internal network was breached in November 2023 and that it's now investigating claims of data theft made by the ALPHV/BlackCat ransomware gang.
February 14th, 2024Source

UK utility giant Southern Water says hackers stole personal data of hundreds of thousands of customers
U.K.-based water utility Southern Water has confirmed that hackers stole the personal data of as many as 470,000 customers in a recent data breach.
February 14th, 2024Source

USPTO: AI Can Assist Inventors But Can't Hold Patents
Humans Must Show Significant Role in AI-Assisted Cases to Get Inventor Label
February 14th, 2024Source or Source or Source or Source or Source

VicOne xNexus offers contextualized insights into complex attack paths
VicOne announced the xNexus next-generation vehicle security operations center (VSOC) platform.
February 14th, 2024Source

What enterprises need to know about cybersecurity compliance [Q&A]
Just as cybersecurity threats are constantly evolving, so are the compliance regulations that organizations must follow. And as these regulations tighten so the risks of non-compliance become higher.
February 14th, 2024Source

Windows Zero-Day Exploited in Attacks on Financial Market Traders
CVE-2024-21412, one of the security bypass zero-days fixed by Microsoft with Patch Tuesday updates, exploited by Water Hydra (DarkCasino).
February 14th, 2024Source

Zoom Patches Critical Vulnerability in Windows Applications
Zoom patches seven vulnerabilities in its products, including a critical-severity bug in its Windows applications.
February 14th, 2024Source

Internet — Security Issues — February 12th, 2024

91 percent of organizations experience software supply chain incidents
The overwhelming majority of organizations (91 percent) have experienced a software supply chain incident in the past 12 months, according to a new report.
February 12th, 2024Source

Account Takeover Campaign Hits Execs in Microsoft Azure
Attackers Downloaded Files Containing Financial, Security and User Information
February 12th, 2024Source or Source or Source or Source or Source

Bugcrowd Attains $102M Strategic Growth Funding Round
Company Will Use Investment to Expand Services, Says CEO Dave Gerry
February 12th, 2024Source or Source or Source

Bugcrowd raises $102 million to boost AI-powered crowdsourced security platform
Bugcrowd has secured $102 million in strategic growth funding to scale its AI-powered crowdsourced security platform offerings globally.
February 12th, 2024Source

CIS ESS Mobile offers visibility into blind spots on mobile devices
While most organizations focus cybersecurity efforts on fortifying their networks, the mobile devices connected to them often remain vulnerable. In addressing this gap, the Center for Internet Security (CIS) introduces CIS Endpoint Security Services (ESS) Mobile, a tailored solution offered exclusively to U.S. State, Local, Tribal, and Territorial (SLTT) organizations.
February 12th, 2024Source

Critical Fortinet FortiOS flaw exploited in the wild (CVE-2024-21762)
Fortinet has patched critical remote code execution vulnerabilities in FortiOS (CVE-2024-21762, CVE-2024-23313), one of which is "potentially" being exploited in the wild.
February 12th, 2024Source

Data Insights Are Key to Fighting Synthetic ID Fraud
Steve Lenderman on the Shift From Synthetic Identity to Synthetic Entity Fraud
February 12th, 2024Source or Source or Source or Source or Source

Decryptor for Rhysida ransomware is available!
Files encrypted by Rhysida ransomware can be successfully decrypted, due to a implementation vulnerability discovered by Korean researchers and leveraged to create a decryptor.
February 12th, 2024Source

Europe's largest caravan club admits wide array of personal data potentially accessed
Experts also put an end to social media security updates
February 12th, 2024Source

Exploitation of Another Ivanti VPN Vulnerability Observed
Organizations urged to hunt for potential compromise as exploitation of a recent Ivanti enterprise VPN vulnerability begins.
February 12th, 2024Source

ExpressVPN User Data Exposed Due to Bug
ExpressVPN disables split tunneling on Windows after learning that DNS requests were not properly directed.
February 12th, 2024Source

Free Rhysida ransomware decryptor for Windows exploits RNG flaw
South Korean researchers have publicly disclosed an encryption flaw in the Rhysida ransomware encryptor, allowing the creation of a Windows decryptor to recover files for free.
February 12th, 2024Source

Hackers exploit Ivanti SSRF flaw to deploy new DSLog backdoor
Hackers are exploiting a server-side request forgery (SSRF) vulnerability in Ivanti Connect Secure, Policy Secure, and ZTA gateways to deploy the new DSLog backdoor on vulnerable devices.
February 12th, 2024Source

Hackers uncover new TheTruthSpy stalkerware victims: Is your Android device compromised?
TechCrunch adds 50,000 new Android device identifiers to spyware lookup tool
February 12th, 2024Source

Jet engine dealer to major airlines discloses 'unauthorized activity'
Pulls part of system offline as Black Basta docs suggest the worst
February 12th, 2024Source

OneTrust platform enhancements accelerate AI adoption
OneTrust announced its newest platform features that make it easier for customers to govern their use of AI and accelerate AI innovation, ensure the responsible use of data across the entire data lifecycle, and achieve compliance program efficiency through enhanced automation and intelligence.
February 12th, 2024Source

Ongoing Azure Cloud Account Takeover Campaign Targeting Senior Personnel
An active cloud account takeover campaign has impacted dozens of Azure environments and compromised hundreds of user accounts.
February 12th, 2024Source

Partial Facebook Marketplace Database Allegedly Leaked by Hackers
The disclosure by the rogue group includes the theft of over 200,000 accounts' data.
February 12th, 2024Source

Ransomware attack forces 100 Romanian hospitals to go offline
100 hospitals across Romania have taken their systems offline after a ransomware attack hit their healthcare management system.
February 12th, 2024Source

Ransomware Disrupts Hospital Services in Romania and France
Emergency Services Are Suspended as Digital Systems Are Pulled Offline
February 12th, 2024Source or Source

Self-Destructing USB Tool Heats Your Flash Drive To Over 100C To Lock Your Data Down
Around the world, countries are plagued with oppression, corruption, and misguided leadership that journalists and ethical hackers are trying to fight. However, keeping data safe from prying eyes can be difficult in some of these places with restrictive laws and invasive policies in place.0
February 12th, 2024Source

Stealthy Cyberespionage Campaign Remained Undiscovered for Two Years
A possibly China-linked threat actor uses a custom backdoor in a cyberespionage campaign ongoing since at least 2021.
February 12th, 2024Source

Visa extends its digital wallet capabilities to minimize the risk of fraud
Visa announced extended digital wallet capabilities within Visa Commercial Pay, a suite of B2B payment solutions built in partnership with Conferma Pay to revolutionize how businesses manage transactions globally.
February 12th, 2024Source

VPN Log versus Zero-Log Policy: A Comprehensive Analysis
Discover the impact on privacy and troubleshooting in our comprehensive analysis, guiding you to make informed choices for a secure online experience.
February 12th, 2024Source

Warzone RAT Shut Down by Law Enforcement, Two Arrested
Warzone RAT dismantled in international law enforcement operation that also involved arrests of suspects in Malta and Nigeria.
February 12th, 2024Source

Why cyber risk assessment is critical to staying ahead of threats [Q&A]
The cybersecurity landscape is changing all the time and security teams are constantly searching for anything that can give them an edge in defending their systems.
February 12th, 2024Source

Internet — Security Issues — February 9th, 2024

Action1 platform update improves patching workflows
Action1 announced its latest release and the introduction of a new guiding concept for its business.
February 9th, 2024Source

AnyDesk Shares More Information on Recent Hack
AnyDesk has provided more information on the recent hack, including when the attack started and its impact.
February 9th, 2024Source

As Elections Loom, So Do Adversaries' Influence Operations
US, UK, South Korea and India Most Targeted for Election Interference, Experts Warn
February 9th, 2024Source or Source or Source

Botnet Attack Targeted Routers: A Wake-Up Call for Securing Remote Employees' Hardware
The FBI spotted this state-sponsored attack that highlights how home office setups can be overlooked when it comes to employees' cybersecurity.
February 9th, 2024Source

Cohesity Is Set to Acquire Veritas' Data Protection Business
The Combined Company Will Be Worth $7B, Firms Say
February 9th, 2024Source

Combating Malware Threats
Understanding the diverse array of malware types is crucial for individuals, organizations, and cybersecurity professionals.
February 9th, 2024Source

Cybercriminals are creating their own AI chatbots to support hacking and scam users
Artificial intelligence (AI) tools aimed at the general public, such as ChatGPT, Bard, CoPilot and Dall-E have incredible potential to be used for good.
February 9th, 2024Source

Fortinet Warns of New FortiOS Zero-Day
Fortinet patches CVE-2024-21762, a critical remote code execution vulnerability that may have been exploited in the wild.
February 9th, 2024Source

Fortinet's week to forget: Critical vulns, disclosure screw-ups, and that toothbrush DDoS attack claim
An orchestra of fails for the security vendor
February 9th, 2024Source

Hackers Are Exploiting a Critical FortiOS SSL VPN Bug
Patch or Disable the SSL VPN, Fortinet Says
February 9th, 2024Source or Source or Source or Source or Source

Hyundai Motor Europe victim of the Black Basta ransomware
Vehicle manufacturer Hyundai and its European branch Hyundai Motor Europe have fallen victim to a ransomware attack by the Black Basta group. This has become known because the ransomware gang has disclosed data from this cyber attack -- the vehicle manufacturer Hyundai had only reported a "technical problem" in response to inquiries from Bleeping Computer.
February 9th, 2024Source

In Other News: $350 Million Google Settlement, AI-Powered Fraud, Cybersecurity Funding
Noteworthy stories that might have slipped under the radar: $350 million Google+ data leak settlement, AI used for fraud, 2023 cybersecurity funding report.
February 9th, 2024Source

Infoblox says IT Pros Are Missing This Mega-Threat From Organised Global Cyber Criminals
Cyber security threat actor VexTrio is flying under the radar for most APAC region cyber security professionals because it is a web traffic distribution middle man rather than an endpoint source of malware.
February 9th, 2024Source

Internet-Exposed Water PLCs Are Easy Targets for Iran
Researchers Find Unprotected Unitronics Devices
February 9th, 2024Source or Source or Source or Source or Source

ISMG Editors: What CISOs Should Prepare for in 2024
Joe Sullivan Also Discusses Identity Management, AI, State of Information Sharing
February 9th, 2024Source or Source or Source or Source or Source

Ivanti Patches High-Severity Vulnerability in VPN Appliances
An XXE flaw in Ivanti Connect Secure, Ivanti Policy Secure, and ZTA gateways could lead to unauthenticated access to resources.
February 9th, 2024Source

Large Language Models Won't Replace Hackers
UK AI Safety Institute Says LLMs Can't Give Novice Hackers Advanced Capabilities
February 9th, 2024SourceSource

Lawmakers Want Clampdown on American VCs Funding Chinese Tech Companies
A congressional investigation finds that US venture capital firms invested billions in Chinese technology companies in semiconductor, AI and cybersecurity, sectors that are a threat to national security.
February 9th, 2024Source

Multiple Vulnerabilities in FortiOS Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in FortiOS, the most severe of which could allow for remote code execution. FortiOS is Fortinet's operating system used across many Fortinet devices. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution in the context of the system. Depending on the privileges associated with the service account, an attacker could then install programs; view, change, or delete data. Service accounts that are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
February 9th, 2024Source

New macOS Backdoor Linked to Prominent Ransomware Groups
Written in Rust, the new RustDoor macOS backdoor appears linked to Black Basta and Alphv/BlackCat ransomware.
February 9th, 2024Source

New RustDoor macOS malware impersonates Visual Studio update
A new Rust-based macOS malware spreading as a Visual Studio update to provide backdoor access to compromised systems uses infrastructure linked to the infamous ALPHV/BlackCat ransomware gang.
February 9th, 2024Source

Number of Attacks Against Critical Infrastructure Is Growing
New Report Shows a Surge in OT/IoT Threats and a 123% Increase in Hacking Attempts
February 9th, 2024Source or Source or Source or Source

Securing the Keys to the Kingdom: Exploring the Depths of Privileged Access Management (PAM)
Discover how PAM, a key element of Zero Trust architecture, safeguards privileged access to secure sensitive information and prevent unauthorized access.
February 9th, 2024Source

Security firm now says toothbrush DDOS attack didn't happen, but source publication says company presented it as real
Dental IoT devices caused millions of Euros in damages for Swiss company, says report.
February 9th, 2024Source

Suspected EncroChat Admin Extradited to France
Authorities Hacked the End-to-End Encryption Platform in 2020
February 9th, 2024Source or Source or Source or Source or Source

Tax Season Alert: Common scams and cracked software
OpenText is committed to providing you with the latest intelligence and tips to safeguard your digital life, especially during high-risk periods like tax season. Our threat analysts are constantly monitor the ebb and flow of various threats. One trend that has recently caught our attention is the notable spike in malware-infected cracked software, particularly as we enter tax season.
February 9th, 2024Source

US Offers $10M Reward for Information on Hive Ransomware Leaders
One year after taking down Hive ransomware, US announces a $10 million reward for information on the group's key members.
February 9th, 2024Source

White House Launches AI Safety Consortium
The National Group Will Develop Guidelines for AI Safety, Security and Red-Teaming
February 9th, 2024Source or Source or Source or Source or Source

White House Targets Software Provider Accountability
Administration Developing 'Liability Regimes' for Manufacturers, Top Official Says
February 9th, 2024Source or Source or Source or Source or Source

Internet — Security Issues — February 7th, 2024

ASUSTOR Alerts Customers to Severe Vulnerability, Surveillance Center Gets Emergency Update
An emergency update is being pushed for Surveillance Center in response to a severe vulnerability detected in the software that could potentially allow an attacker to gain control elevated privileges to execute code on ADM to install malware. This update fixes this underlying vulnerability.
February 7th, 2024Source

AceMagic Promises It Won't Ship Anymore Mini PCs With Pre-Installed Spyware
Most of the time, preinstalled software on a PC can range from annoying to innocuous, with the occasional trip into "hey, this isn't so bad" territory. But sometimes, a PC can get imaged with something really nasty, causing buyers heartache well outside the norm. Such is the case with at least some AceMagic mini PCs, though the company swears it will remedy the situation.
February 7th, 2024Source

ASUSTOR Issues Urgent Surveillance Center Update Due to Critical Vulnerability
An urgent update is being released for Surveillance Center software in response to a critical vulnerability recently discovered. This vulnerability poses a significant risk as it could potentially grant attackers elevated privileges to execute malicious code on ADM, facilitating malware installation. ASUSTOR advises all users of Surveillance Center for ADM to promptly install the latest version to mitigate this risk effectively.
February 7th, 2024Source

China-backed Volt Typhoon hackers have lurked inside US critical infrastructure for 'at least five years'
China-backed hackers have maintained access to American critical infrastructure for "at least five years" with the long-term goal of launching "destructive" cyberattacks, a coalition of U.S. intelligence agencies warned on Wednesday.
February 7th, 2024Source

Chinese hackers breached Dutch Ministry of Defense
Chinese state-sponsored hackers have breached the Dutch Ministry of Defense (MOD) last year and deployed a new remote access trojan (RAT) malware to serve as a backdoor.
February 7th, 2024Source

Chinese hackers fail to rebuild botnet after FBI takedown
Chinese Volt Typhoon state hackers failed to revive a botnet recently taken down by the FBI, which was previously used in attacks targeting critical infrastructure across the United States.
February 7th, 2024Source

Chinese hackers hid in US infrastructure network for 5 years
The Chinese Volt Typhoon cyber-espionage group infiltrated a critical infrastructure network in the United States and remained undetected for at least five years before being discovered, according to a joint advisory from CISA, the NSA, the FBI, and partner Five Eyes agencies.
February 7th, 2024Source

Chinese Hackers Penetrated Unclassified Dutch Network
Beijing Used FortiGate Vulnerability to Install Trojan
February 7th, 2024Source or Source or Source or Source or Source

Chinese Hackers Preparing 'Destructive Attacks,' CISA Warns
Officials Say Hackers Are Evading Detection on Critical Infrastructure Networks
February 7th, 2024Source or Source or Source or Source or Source

US Says China's Volt Typhoon Hackers 'Pre-Positioning' for Cyberattacks Against Critical Infrastructure
New CISA alert includes technical mitigations to harden attack surfaces and instructions to hunt for the Chinese government-backed hackers.
February 7th, 2024Source

Cybersecurity burnout hits APAC firms, with lack of resources the key challenge
Almost all cybersecurity professionals in the region are experiencing adverse effects from burnout, including lost productivity and breaches.
February 7th, 2024Source

Cybersecurity M&A Roundup: 34 Deals Announced in January 2024
Thirty-four cybersecurity-related merger and acquisition (M&A) deals were announced in January 2024.
February 7th, 2024Source

Device Authority Raises $7M for Enterprise IoT Identity and Access Management Platform
Device Authority raises $7 million in a Series A funding round for its enterprise identity and access management for IoT solution.
February 7th, 2024Source

DHS Is Recruiting Techies for the AI Corps
The Agency Plans to Hire 50 AI Experts This Year
February 7th, 2024Source or Source or Source or Source

Draft UN Cybercrime Treaty Could Make Security Research a Crime, Leading 124 Experts to Call on UN Delegates to Fix Flawed Provisions that Weaken Everyone's Security
Security researchers' work discovering and reporting vulnerabilities in software, firmware, networks, and devices protects people, businesses and governments around the world from malware, theft of critical data, and other cyberattacks. The internet and the digital ecosystem are safer because of their work.
February 7th, 2024Source

DynaRisk Cyber Intelligence Data Lake enhances the accuracy of data breach predictions
DynaRisk launched Cyber Intelligence Data Lake. This major feature upgrade propels the company's capabilities in preventing and predicting hacker activity.
February 7th, 2024Source

Endpoint security startup NinjaOne lands $231.5M at $1.9B valuation
Just two years ago, VC funding to cybersecurity startups was on fire. Indeed, $23 billion flooded the sector, per Crunchbase. But in 2023, cybersecurity upstarts only saw a third of that — the result of the exceptional surge in 2021, bloated valuations and investors wary of market instability.
February 7th, 2024Source

Entrust in final talks to acquire Onfido
Entrust has entered into exclusive discussions to acquire Onfido. With this contemplated acquisition, Entrust would add a compliant AI/ML-based biometric and document IDV tech stack to its portfolio of identity solutions.
February 7th, 2024Source

Facebook ads push new Ov3r_Stealer password-stealing malware
A new password-stealing malware named Ov3r_Stealer is spreading through fake job advertisements on Facebook, aiming to steal account credentials and cryptocurrency.
February 7th, 2024Source

Fortinet Patches Critical Vulnerabilities in FortiSIEM
Two critical OS command injection flaws in FortiSIEM could allow remote attackers to execute arbitrary code.
February 7th, 2024Source

Google Play Protect introduces new financial fraud protection for Android users
Google Play is adding more security layers to Play Protect to prevent financial fraud. It is developing a fraud protection project that will initially be tested in Singapore in the next few weeks.
February 7th, 2024Source

Google Settles Google+ API Data Leak Lawsuit for $350M
Plaintiffs Alleged Google Sought to Cover Up API Flaw That Exposed Private Data
February 7th, 2024Source or Source or Source or Source

Hackers could have enslaved 3 million toothbrushes for DDoS attack
Or is it just a theoretical incident?
February 7th, 2024Source

Half of polled infosec pros say their degree was less than useful for real-world work
The other half paid attention in class?
February 7th, 2024Source

Holes Appear in Internet-Connected Toothbrush Botnet Warning
Don't Brush in Fear, as Supposed DDoS Dental Trauma Fails to Pass Muster
February 7th, 2024Source or Source or Source or Source or Source

How to Apply Zero Trust to your Active Directory
In the past, many organizations chose to trust users and devices within their secure perimeters. This is no longer possible, with workers spread out geographically and needing access from multiple locations and devices. End-users need access to corporate systems and cloud applications beyond traditional work boundaries and they expect seamless, fast authentication.
February 7th, 2024Source

Ivanti Connect Secure flaw massively exploited by attackers (CVE-2024-21893)
CVE-2024-21893, a server-side request forgery (SSRF) vulnerability affecting Ivanti Connect Secure VPN gateways and Policy Secure (a network access control solution), is being exploited by attackers.
February 7th, 2024Source

JetBrains Patches Authentication Bypass Flaw in TeamCity
Shadowserver Foundation Found Approximately 2,000 Exposed JetBrains Servers
February 7th, 2024Source or Source

LockBit Ransomware Gang Allegedly Threatens Murder Of Forum Admin
We know that ransomware has severe negative effects, such as hospitalizing security professionals from the sheer stress stemming from these sorts of attacks. We also know that the threat actors behind these operations are the lowest of the low and will do anything to maintain profit and their nefarious businesses, regardless of the effects.
February 7th, 2024Source

Medical Center Fined $4.75M in Insider ID Theft Incident
HHS OCR Says a Malicious Worker Stole and Sold Patient Information in 2013
February 7th, 2024Source or Source or Source or Source

Microsoft BitLocker encryption cracked in just 43 seconds with a $4 Raspberry Pi Pico
BitLocker is available in Windows 11 Pro, Enterprise, and Education editions
February 7th, 2024Source

Mini PCs sold on Amazon contained factory-installed spyware
The manufacturer claims newer PC shipments are malware-free
February 7th, 2024Source

Most Linux Systems Exposed to Complete Compromise via Shim Vulnerability
A critical remote code execution vulnerability in Shim could allow attackers to take over vulnerable Linux systems.
February 7th, 2024Source

No, 3 million electric toothbrushes were not used in a DDoS attack
A widely reported story that 3 million electric toothbrushes were hacked with malware to conduct distributed denial of service (DDoS) attacks is likely a hypothetical scenario instead of an actual attack.
February 7th, 2024Source

On-premises JetBrains TeamCity servers vulnerable to auth bypass (CVE-2024-23917)
JetBrains has patched a critical authentication bypass vulnerability (CVE-2024-23917) affecting TeamCity On-Premises continuous integration and deployment servers.
February 7th, 2024Source

OneTrust launches Data Privacy Maturity Model
OneTrust introduced Data Privacy Maturity Model. The model provides privacy, security, marketing, and data teams with the resources to transform their privacy programs from tactical compliance initiatives that mitigate risk, to strategic customer trust imperatives that unlock the value of data for AI innovation, customer engagement, and business analytics.
February 7th, 2024Source

Qualys TotalCloud 2.0 measures cyber risk in cloud and SaaS apps
Qualys unveiled TotalCloud 2.0. This significant upgrade to Qualys' AI-powered cloud native application protection platform (CNAPP) delivers a single prioritized view of cloud risk and is the first to extend its protection to SaaS applications.
February 7th, 2024Source

Ransomware leak site reports rose by 49% in 2023, but there is good news
2023 was a booming year for ransomware groups, thanks to a particular type of vulnerability.
February 7th, 2024Source

Ransomware payments reached record $1.1 billion in 2023
Ransomware payments in 2023 soared above $1.1 billion for the first time, shattering previous records and reversing the decline seen in 2022, marking the year as an exceptionally profitable period for ransomware gangs.
February 7th, 2024Source

Record-Breaking Ransomware Profits Surpassed $1B in 2023
Ongoing Innovation and Sophistication Drive Unparalleled Profits
February 7th, 2024Source or Source or Source or Source or Source

Securiti AI enables organizations to safely use AI
Securiti AI released AI Security & Governance offering, providing a solution to enable safe adoption of AI.
February 7th, 2024Source

Security Researcher Allegedly Hacked Apple's Backend, Scammed $2.5 Million
Staggeringly, Apple thanked the defendant, Noah Roskin-Frazee, in a security update less than two weeks after he was arrested.
February 7th, 2024Source

SolarWinds offers complete hybrid visibility across on-premises and cloud networks
SolarWinds announced enhancements to its SaaS-based and self-hosted, on-premises observability solutions built to monitor and observe complex, distributed environments from anywhere.
February 7th, 2024Source

Spyware Detected in AceMagic Mini-PCs: Malware Infestation Raises Security Concerns
Shenzhen Shanminheng Technology Co., Ltd., the creator of popular mini-PC brands like AceMagic, Kamrui, NiPoGi, and CTONE, has come under scrutiny for shipping some models with hidden harmful software. Jon from The Net Guy Reviews brought this to light on his YouTube channel, revealing that the AceMagic AD08 model, among others, came with spyware. This alarming issue might extend across several products in their lineup.
February 7th, 2024Source

The CIS® and MS-ISAC® cybersecurity professionals analyze risks and alert members to current online security threats.
Timely updates when you need to take action
February 7th, 2024Source

The fight against commercial spyware misuse is heating up
Though there are organizations out there investigating how commercial spyware is misused to target journalists, human rights defenders and dissidents, the growing market related to the development and sale of this type of software and the exploits used to deploy it is still very much shrouded in mystery.
February 7th, 2024Source

The spyware business is booming despite government crackdowns
'Almost zero data being shared across the industry on this particular threat,' we're told
February 7th, 2024Source

No, 3 million electric toothbrushes were not used in a DDoS attack
A widely reported story that 3 million electric toothbrushes were hacked with malware to conduct distributed denial of service (DDoS) attacks is likely a hypothetical scenario instead of an actual attack.
February 7th, 2024Source

The way AI is enhancing online security
In an era marked by the relentless expansion of digital connectivity, the assurance of robust online security stands as a critical imperative. Cyber threats, characterized by their growing sophistication and frequency, demand innovative solutions to safeguard sensitive data and preserve privacy.
February 7th, 2024Source

US officials believe Chinese hackers lurk in critical infrastructure
They've been lurking for at least five years, according to a report obtained by CNN.
February 7th, 2024Source

US says China's Volt Typhoon is readying destructive cyberattacks
12 international govt agencies sound the alarm, critical infrastructure at the heart of threats
February 7th, 2024Source

Verizon Says Data Breach Impacted 63,000 Employees
Verizon is notifying 63,206 employees that their personal information was exposed in an internal data breach.
February 7th, 2024Source

Your personal data is political: Computer scientists find gaps in the privacy practices of campaign websites
Would you trust a random political canvasser to do whatever they wanted with your resume, your friends' email addresses—and perhaps your profile pictures?
February 7th, 2024Source

Internet — Security Issues — February 5th, 2024

Airbus App Vulnerability Introduced Aircraft Safety Risk: Security Firm
Navblue Flysmart+ Manager allowed attackers to modify aircraft engine performance calculation, intercept data.
February 5th, 2024Source

AnyDesk Confirms Systems Hacked, Triggers Password Reset
Company Says Problem Remediated, All Security-Related Certificates Revoked
February 5th, 2024Source or Source or Source or Source or Source

AnyDesk Hacked: Revokes Passwords, Certificates in Response
AnyDesk is revoking certificates and passwords in response to a significant security breach impacting production systems.
February 5th, 2024Source

AnyDesk has been hacked, users urged to change passwords
AnyDesk Software GmbH, the German company behind the widely used (and misused) remote desktop application of the same name, has confirmed they've been hacked and their production systems have been compromised.
February 5th, 2024Source

Deepfaked video conference call makes employee send $25 million to scammers
A deepfake video conference call paired with social engineering tricks has led to the theft of over US$25 million from a multinational firm, the South China Morning Post has reported.
February 5th, 2024Source

EquiLend Continues System Restoration Post-Ransomware Attack
Back Online: NGT Platform, Which Handles Daily Transactions Worth $100 Billion
February 5th, 2024Source or Source or Source or Source or Source

Google Open Sources AI-Aided Fuzzing Framework
Google has released its fuzzing framework in open source to boost the ability of developers and researchers to identify vulnerabilities.
February 5th, 2024Source

Hackers Take Clorox To The Cleaners In $49 Million Cyberattack
Cyberattacks are no joke, as they'll clean out your systems, bank account and your mental and physical health, regardless of whether or not there was a ransom involved. This is precisely what consumer and professional cleaning products brand Clorox found from its August-thru-September 2023 cyberattack, which has cost the company $49 million in expenses to recover from.
February 5th, 2024Source

Microsoft Outlook December updates trigger ICS security alerts
Microsoft is investigating an issue that triggers Outlook security alerts when trying to open .ICS calendar files after installing December 2023 Patch Tuesday Office security updates.
February 5th, 2024Source

Mitsubishi Electric Factory Automation Flaws Expose Engineering Workstations
Critical and high-severity Mitsubishi Electric Factory Automation vulnerabilities can allow privileged access to engineering workstations.
February 5th, 2024Source

OT Maintenance Is Primary Source of OT Security Incidents: Report
A new ICS security report from TXOne Networks says many OT security incidents involved ransomware and vulnerability exploitation.
February 5th, 2024Source

QNAP Patches High-Severity Bugs in QTS, Qsync Central
Two high-severity vulnerabilities in QNAP's operating system could lead to command execution over the network.
February 5th, 2024Source

Researchers map decision-making processes of victims of ransomware
University of Twente has investigated the decision-making processes of victims forced to pay ransom following ransomware attacks. UT researcher Tom Meurs and his colleagues analyzed data provided by the Dutch National Police and a Dutch incident response organization on 481 ransomware attacks.
February 5th, 2024Source

The ransomware business is booming, even as enforcers shut down some major players
Palo Alto Networks' Unit 42 found a 49 percent bump in victims reported by ransomware leak sites in 2023.
February 5th, 2024Source

UK Government Warned of AI Regulatory Capture by Big Tech
UK Parliament Urges Competition Regulator to Keep LLMs Under 'Close Review'
February 5th, 2024Source or Source or Source or Source or Source

US announces visa ban on those linked to commercial spyware
Secretary of State Antony J. Blinken announced today a new visa restriction policy that will enable the Department of State to ban those linked to commercial spyware from entering the United States.
February 5th, 2024Source

Varonis MDDR helps organizations prevent data breaches
Varonis introduced Varonis Managed Data Detection and Response (MDDR), a managed service dedicated to stopping threats at the data level.
February 5th, 2024Source

Internet — Security Issues — February 2nd, 2024

2 Chicago Hospitals Are Facing Cyberattack Woes
Pediatric Hospital and Safety-Net Facility Are Dealing With Recent Incidents
February 2nd, 2024Source or Source or Source or Source or Source

31 People Arrested in Global Cybercrime Crackdown
Law enforcement in 50 countries partner to take down ransomware, banking malware, and phishing threats.
February 2nd, 2024Source

AnyDesk says hackers breached its production servers, reset passwords
AnyDesk confirmed today that it suffered a recent cyberattack that allowed hackers to gain access to the company's production systems. BleepingComputer has learned that source code and private code signing keys were stolen during the attack.
February 2nd, 2024Source

Biden to Veto Attempt to Overturn SEC Cyber Incident Disclosure Rules
President Biden would veto Republican lawmakers' attempt to overturn the SEC's recent cyber incident disclosure rules.
February 2nd, 2024Source

Botnet Attack Targeted Routers: A Wake-Up Call for Securing Remote Employees' Hardware
The FBI spotted this state-sponsored attack that highlights how home office setups can be overlooked when it comes to employees' cybersecurity.
February 2nd, 2024Source

Breach Roundup: CIA Hacking Tool Leaker Gets 40 Years
Also: Cloudflare Was Hacked With Stolen Okta Token
February 2nd, 2024Source or Source or Source or Source or Source

Clorox Says Cyberattack Costs Exceed $49 Million
Cleaning products maker Clorox puts the impact of the damaging cyberattack at $49 million so far and expects to incur more costs in 2024.
February 2nd, 2024Source

Cloudflare Hacked by Suspected State-Sponsored Threat Actor
A nation-state threat actor accessed internal Cloudflare systems using credentials stolen during the Okta hack.
February 2nd, 2024Source

Cyber security at home and in the office: Secure your devices, computers, and networks (ITSAP.00.007)
With the increase in remote work, we rely on numerous devices and our ability to connect to the Internet for work and personal reasons. However, cyber threat actors take advantage of our reliance on technology.
February 2nd, 2024Source

DLP: AI-Based Approach
This article briefly talks about the AI-based approach to Data Loss Prevention (DLP) strategies. AI offers several advantages over traditional approaches.
February 2nd, 2024Source

DraftKings Hacker Sentenced to 18 Months in Prison
Joseph Garrison has received an 18-month prison sentence for accessing 60,000 DraftKings user accounts using credential stuffing.
February 2nd, 2024Source

Ex-CIA Computer Engineer Gets 40 Years in Prison for Giving Spy Agency Hacking Secrets to WikiLeaks
Former CIA software engineer sentenced to 40 years in prison for biggest theft of classified information in CIA history and for possession of child sexual abuse images and videos.
February 2nd, 2024Source

Feds Face a Midnight Deadline for Resetting Ivanti Gateways
CISA Says Agencies Must Disconnect and Reset Ivanti VPN Devices by Midnight Friday
February 2nd, 2024Source or Source or Source or Source or Source

FTC Blasts Blackbaud's 'Shoddy' Practices in Ransomware Hack
FTC Is Latest Agency to Rebuke Fundraising Firm for Lax Security in 2020 Attack
February 2nd, 2024Source or Source or Source or Source or Source

FTC Orders Blackbaud to Address Poor Security Practices
FTC and fundraising software company Blackbaud reach settlement over poor security practices that led to a major data breach.
February 2nd, 2024Source

Interpol operation Synergia takes down 1,300 servers used for cybercrime
An international law enforcement operation code-named 'Synergia' has taken down over 1,300 command and control servers used in ransomware, phishing, and malware campaigns.
February 2nd, 2024Source

Interpol's latest cybercrime intervention dismantles ransomware, banking malware servers
Efforts part of internationally coordinated operations carried out in recent months
February 2nd, 2024Source

Is critical infrastructure prepared for OT ransomware?
As extortion tactics evolve, operational shutdowns are the next step
February 2nd, 2024Source

Layoffs Hit Security Vendors Okta, Proofpoint, Netography
Prominent security vendors Okta and Proofpoint announced layoffs affecting almost 1,000 employees in the United States and Israel.
February 2nd, 2024Source

Lurie Children's Hospital took systems offline after cyberattack
Lurie Children's Hospital in Chicago was forced to take IT systems offline after a cyberattack, disrupting normal operations and delaying medical care in some instances.
February 2nd, 2024Source

More Ransomware Victims Are Declining to Pay Extortionists
While Average Falls Below 30%, We're Still Far From Seeing Criminal Profits Dry Up
February 2nd, 2024Source or Source or Source or Source or Source

Over half of companies experienced cybersecurity incidents last year
According to new research from International Data Corporation (IDC) and Exabeam, 57 percent of companies experienced significant security incidents in the last year that needed extra resources to address.
February 2nd, 2024Source

Palo Alto Told to Pay Centripetal $150M for Patent Theft
Federal Court Says Palo Alto Networks Violated Centripetal's Patent Rights
February 2nd, 2024Source or Source or Source or Source or Source

San Francisco Police's Live Surveillance Yields Almost 200 Hours of Spying--Including of Music Festivals
A new report reveals that in just three months, from July 1 to September 30, 2023, the San Francisco Police Department (SFPD) racked up 193 hours and 19 minutes of live access to non-city surveillance cameras.
February 2nd, 2024Source

Stalkerware apps PhoneSpector and Highster appear shut down after NY settlement
The makers of two phone surveillance services appear to have shuttered after the owner agreed to settle state accusations of illegally promoting spyware that his companies developed.
February 2nd, 2024Source

Uber Fined 10 Million Euros by Dutch Data Regulator
Ride-Hailing Company Fined for Inadequate Data Transparency Practices Under GDPR
February 2nd, 2024Source or Source or Source or Source or Source

US Sanctions Iranian Cyber Heads for Attacks on Israeli Tech
Sanctions Follow Iranian Cyberattacks Targeting US Critical Infrastructure Sectors
February 2nd, 2024Source or Source or Source or Source

US Slaps Sanctions on 'Dangerous' Iranian Hackers Linked to Water Utility Hacks
The US government slaps sanctions against six Iranian government officials linked to cyberattacks against Israeli PLC vendor Unitronics.
February 2nd, 2024Source

Verimatrix partners with AWS to increase reliability for OTT content security
Verimatrix collaboration with AWS to further bolster scalability, availability and ease of use for its Streamkeeper Multi-DRM cloud-based OTT content security platform.
February 2nd, 2024Source

We are living in a 'digital dark age': How to protect your photos, videos and other data
If you have grown up with social media, chances are you have taken more photos in the last couple of decades than you will ever remember. When mobile phones suddenly became cameras too, social media turned into a community photo album, with memories kept online forever and ever. Or so we thought.
February 2nd, 2024Source

Internet — Security Issues — February 1st, 2024

LockBit shows no remorse for ransomware attack on children's hospital
It even had the gall to set the ransom demand at $800K … for a nonprofit
February 1st, 2024Source

Internet — Security Issues — January 31st, 2024

45,000 Exposed Jenkins Instances Found Amid Reports of In-the-Wild Exploitation
Shadowserver Foundation has seen 45,000 Jenkins instances affected by CVE-2024-23897, which may already be exploited in attacks.
January 31, 2024Source

A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs
A zero-day vulnerability that, when triggered, could crash the Windows Event Log service on all supported (and some legacy) versions of Windows could spell trouble for enterprise defenders.
January 31, 2024Source

After Delays, Ivanti Patches Zero-Days and Confirms New Exploit
Ivanti documents a brand-new zero-day and belatedly ships patches; Mandiant is reporting "broad exploitation activity."
January 31, 2024Source

FBI confirms it issued remote kill command to blow out Volt Typhoon's botnet
Disinfects Cisco and Netgear routers to thwart Chinese critters
January 31, 2024Source

FBI disrupts Chinese botnet by wiping malware from infected routers
The FBI has disrupted the KV-botnet used by Chinese Volt Typhoon state hackers to evade detection during attacks targeting U.S. critical infrastructure.
January 31, 2024Source

Hackers push USB malware payloads via news, media hosting sites
A financially motivated threat actor using USB devices for initial infection has been found abusing legitimate online platforms, including GitHub, Vimeo, and Ars Technica, to host encoded payloads embedded in seemingly benign content.
January 31, 2024Source

Hackers used Ars Technica and Vimeo to deliver malware using obfuscated binary instructions in a URL
Researchers say they have never seen this technique before now
January 31, 2024Source

Here's How the FBI Stopped a Major Chinese Hacking Campaign
FBI and CISA Detail Operation to Prevent China's Attacks on Critical Infrastructure
January 31, 2024Source or Source or Source or Source or Source

Hitron DVR Zero-Day Vulnerabilities Exploited by InfectedSlurs Botnet
Akamai flags six zero-day vulnerabilities in Hitron DVRs exploited to ensnare devices in the InfectedSlurs botnet.
January 31, 2024Source

How to Align Your Incident Response Practices With the New SEC Disclosure Rules
By turning incident response simulation into a continuous process and employing innovative tools, you can address the stringent requirements of the new SEC incident disclosure rules.
January 31, 2024Source

Ivanti Discloses Additional Zero-Day That Is Being Exploited
Company Starts Patch Rollout for Flaws Exploited by Likely Chinese Intelligence Op
January 31, 2024Source or Source or Source or Source or Source

Ivanti patches two zero-days under attack, but finds another
Ivanti warned on Wednesday that hackers are exploiting another previously undisclosed zero-day vulnerability affecting its widely used corporate VPN appliance.
January 31, 2024Source

Jenkins Servers Used for CI/CD Contain Critical RCE Flaw
Approximately 45,000 Vulnerable Servers Worldwide
January 31, 2024Source or Source or Source or Source or Source

Kentik AI improves network monitoring and observability
Kentik launched Kentik AI to give any engineer, operator, architect, or developer the ability to troubleshoot complex networks.
January 31, 2024Source

Mercedes Source Code Exposed by Leaked GitHub Token
A leaked token provided unrestricted access to the entire source code on Mercedes-Benz's GitHub Enterprise server.
January 31, 2024Source

Nearly 4-year-old Cisco vuln linked to recent Akira ransomware attacks
Evidence mounts of an exploit gatekept within Russia's borders
January 31, 2024Source

Netherlands fines Uber over data protection
Dutch regulators on Wednesday imposed a 10 million euro ($10.8 million) fine on ride-hailing app Uber for lack of transparency in treating the personal data of its drivers.
January 31, 2024Source

ProcessUnity unveils all-in-one platform for third-party risk management
ProcessUnity announced the completed integration of the Global Risk Exchange, making it the all-in-one risk platform for modernizing TPRM (Third-party risk management).
January 31, 2024Source

Proofpoint Lays Off 6% of Workforce, Offshores Jobs
Private Equity-Owned Firm Lets 280 People Go, Moves Jobs to Argentina and Ireland
January 31, 2024Source or Source or Source or Source or Source

Pushing the Healthcare Sector to Improve Cybersecurity
Steve Cagle, CEO of Clearwater, on HHS' New Cyber Performance Goals
January 31, 2024Source or Source or Source or Source or Source

Ransomware Attack on Schneider Electric Sustainability Unit
Manufacturer Confirms Systems Down; Data on Energy Consumption, Emission Accessed
January 31, 2024Source or Source or Source or Source or Source

Stealth Firm Reken Raises $10 Million Seed Funding
Reken, an AI-defense cybersecurity startup still in stealth mode raises $10 million before revealing its product.
January 31, 2024Source

Tor Code Audit Finds 17 Vulnerabilities
Over a dozen vulnerabilities discovered in Tor audit, including a high-risk flaw that can be exploited to inject arbitrary bridges.
January 31, 2024Source

Top Tips to Avoid Corporate Social Media Account Hijacking
Not a Good Look: Hijacked @SECgov Social Media Account Spews Bitcoin Rumors
January 31, 2024Source or Source or Source or Source or Source

US Gov Disrupts SOHO Router Botnet Used by Chinese APT Volt Typhoon
The US government neutralizes a botnet full of end-of-life Cisco and Netgear routers being by a notorious Chinese APT group.
January 31, 2024Source

US IaaS Providers Face 'Know Your Customer' Regulation
Rule Is a Bid to Deter Malicious Foreign Use of US IaaS Providers
January 31, 2024Source or Source or Source or Source or Source

We know nations are going after critical systems, but what happens when crims join in?
This isn't going to end well
January 31, 2024Source

Why identity is the cornerstone of a zero trust architecture
As organizations continue to embrace digital transformation to gain access to the cloud's many benefits, this means that computing environments are evolving into borderless IT ecosystems. Digital identities are also evolving at pace and identity security is now a crucial aspect of cybersecurity.
January 31, 2024Source

Internet — Security Issues — January 29th, 2024

Bastille Networks Raises $44 Million to Secure Wireless Devices
Goldman Sachs leads wireless threat intelligence firm Bastille Networks' $44 million Series C funding round.
January 29, 2024Source

Biden's AI Executive Order, 90 Days On
White House Touts Progress in AI Innovation, Regulation
January 29, 2024Source or Source or Source or Source or Source

Canadian Man Sentenced to Prison for Ransomware Attacks
Matthew Philbert was sentenced to two years for launching cyberattacks on Canadian businesses and government entities.
January 29, 2024Source

Critical Jenkins RCE flaw exploited in the wild. Patch now! (CVE-2024-23897)
Several proof-of-concept (PoC) exploits for a recently patched critical vulnerability (CVE-2024-23897) in Jenkins have been made public and there's evidence of exploitation in the wild.
January 29, 2024Source

Dynatrace acquires Runecast to improve cloud-native security
Dynatrace announced it signed a definitive agreement to acquire Runecast, a provider of AI-powered security and compliance solutions.
January 29, 2024Source

Edge Security for IoT: Protecting Data at the Edge
In the world of IoT, edge security is crucial. This article explores the unique security challenges and strategies for safeguarding IoT data and devices at the edge.
January 29, 2024Source

Energy giant Schneider Electric hit by Cactus ransomware attack
Energy management and automation giant Schneider Electric suffered a Cactus ransomware attack leading to the theft of corporate data, according to people familiar with the matter.
January 29, 2024Source

Free link checker helps identify malicious websites
Cybersecurity company NordVPN is launching a new, free tool to allow users to check the safety of a website before visiting it.
January 29, 2024Source

In a hybrid world, enterprises need 'always-on' endpoint management
In the era of hybrid work, endpoints act as the nerve center of business operations -- distributed across multiple locations and networks. While this has bolstered employee productivity and flexibility, the shift has also increased IT challenges, and the exposure to cyber threats targeting remote employees.
January 29, 2024Source

In Final Talks on Proposed UN Cybercrime Treaty, EFF Calls on Delegates to Incorporate Protections Against Spying and Restrict Overcriminalization or Reject Convention
UN Member States are meeting in New York this week to conclude negotiations over the final text of the UN Cybercrime Treaty, which—despite warnings from hundreds of civil society organizations across the globe, security researchers, media rights defenders, and the world's largest tech companies—will, in its present form, endanger human rights and make the cyber ecosystem less secure for everyone.
January 29, 2024Source

Italian Regulator Again Finds Privacy Problems in OpenAI
ChatGPT Maker Has 30 Days to Respond
January 29, 2024Source or Source or Source or Source or Source

Ivanti Struggling to Hit Zero-Day Patch Release Schedule
Ivanti is struggling to hit its own timeline for the delivery of patches for critical — and already exploited — flaws in its flagship VPN appliances.
January 29, 2024Source

Juniper Networks introduces AI-Native Networking Platform
Juniper Networks announced an AI-Native Networking Platform, purpose-built to leverage AI to assure the best end-to-end operator and end-user experiences.
January 29, 2024Source

Multiple Vulnerabilities in Jenkins Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Jenkins, the most severe of which could allow for remote code execution.
January 29, 2024Source

PoC Exploit Published for Critical Jenkins Vulnerability
PoC exploit code targeting a critical Jenkins vulnerability patched last week is already publicly available.
January 29, 2024Source

Ransomware payments drop to record low as victims refuse to pay
The number of ransomware victims paying ransom demands has dropped to a record low of 29% in the final quarter of 2023, according to ransomware negotiation firm Coveware.
January 29, 2024Source

Ransomware's Impact Could Include Heart Attacks, Strokes & PTSD
New research details the possible effects of ransomware attacks on businesses and staff, society, the economy and national security, highlighting that its impact on mental and physical health is often overlooked.
January 29, 2024Source

SecurityWeek Analysis: Cybersecurity M&A Dropping, Over 400 Deals Announced in 2023
An analysis conducted by SecurityWeek shows that 413 cybersecurity-related mergers and acquisitions were announced in 2023.
January 29, 2024Source

SolarWinds Requests Court Dismiss Regulator's Fraud Case
Calls Securities and Exchange Commission's Cybersecurity Allegations 'Unfounded'
January 29, 2024Source or Source or Source or Source

Tech Moves: Ex-Amazon sports leader lands at DraftKings; Seattle tech vet launches advisory firm
Dave Cotter, a longtime Seattle tech leader who sold a startup to Nordstrom and most recently led product at Leafly, launched a new advisory firm called D3 Advisors.
January 29, 2024Source

The Data Breach "Personal Stash" Ecosystem
I've always thought of it a bit like baseball cards; a kid has a card of this one player that another kid is keen on, and that kid has a card the first one wants so they make a trade. They both have a bunch of cards they've collected over time and by virtue of existing in the same social circles, trades are frequent, and cards flow back and forth on a regular basis.
January 29, 2024Source

Try These Expert-Approved Exercises to Stay Healthy as You Age
You might have heard the myth that older adults can't exercise, but it's possible to stay fit while avoiding injuries or issues as you age.
January 29, 2024Source

US Aid Office in Colombia Reports Its Facebook Page Was Hacked
The Colombia office of the U.S. government agency that oversees foreign aid and development funding said its Facebook page was hacked and asked the public to ignore any posts or links from the account.
January 29, 2024Source

Vulnerabilities in WatchGuard, Panda Security Products Lead to Code Execution
Two memory safety vulnerabilities in WatchGuard and Panda Security products could lead to code execution with System privileges.
January 29, 2024Source

Why identity security could be the Achilles heel of your business [Q&A]
Most successful cyberattacks rely on compromised identity or social engineering. Yet this can be a major blindspot for enterprises with basic awareness of the problem lacking and a growing number of personal devices used for work.
January 29, 2024Source

You Receive Social Security Benefits: Do You Have to File a Tax Return in 2024?
We'll help you find out if you need to submit a tax return this year as a Social Security beneficiary.
January 29, 2024Source

Internet — Security Issues — January 26th, 2024

23andMe confirms last year's massive data breach went unnoticed for five months, hackers stole raw genotype data
The company previously blamed customers for reusing passwords
January 26, 2024Source

Akira ransomware gang says it stole passport scans from Lush in 110 GB data heist
Cosmetics brand goes from Jackson Pollocking your bathwater to cleaning up serious a digital mess
January 26, 2024Source

Apple's rivals aren't happy about its EU App Store changes
But is anyone surprised Apple would act to protect its platform like this?
January 26, 2024Source

Breaking the cybersecurity automation logjam won't break the bank
Right now, to boost efficiency and achieve economies of scale, businesses want to automate as much as possible. In back office processes, approaches like Robotic Process Automation (RPA), for example, are now increasingly standard and are expected to be a $20bn-plus market by 2030.
January 26, 2024Source

CISA Aiming to Improve SBOM Implementation With New Guidance
US Cyber Agency Issues Step-by-Step Guide to Build Software Bills of Materials
January 26, 2024Source or Source or Source or Source or Source

Civil Society Sounds Alarms on UN Cybercrime Treaty
Final Round of Negotiations Set to Begin on Monday
January 26, 2024Source or Source or Source

Critical Jenkins Vulnerability Leads to Remote Code Execution
A critical vulnerability in Jenkins' built-in CLI allows remote attackers to obtain cryptographic keys and execute arbitrary code.
January 26, 2024Source

Elusive Chinese Cyberspy Group Hijacks Software Updates to Deliver Malware
The China-linked cyberespionage group Blackwood has been caught delivering malware to entities in China and Japan.
January 26, 2024Source

Hackers Earn $1.3M for Tesla, EV Charger, Infotainment Exploits at Pwn2Own Automotive
Participants have earned more than $1.3 million for hacking Teslas, EV chargers and infotainment systems at Pwn2Own Automotive.
January 26, 2024Source

ICO confirms data breach probe as UK councils remain downed by cyberattack
Three local councils in the United Kingdom continue to experience disruption to their online services, a week after confirming a cyberattack had knocked some systems offline.
January 26, 2024Source

In Other News: Secure Use of AI, HHS Hacking, CISA Director Swatting
Noteworthy stories that might have slipped under the radar: guidance on secure use of AI, HHS grant money stolen by hackers, CISA director target of swatting.
January 26, 2024Source

ISMG Editors: Emerging AI Tech for Cloud Security in 2024
Payments Expert Troy Leach Joins the Panel to Cover AI, Zero Trust and IoT Security
January 26, 2024Source or Source or Source or Source or Source

Making cybersecurity elementary [Q&A]
There are so many terms and acronyms used in the cybersecurity sector that it can be a little overwhelming at times, even for people who work in the industry.
January 26, 2024Source

Microsoft explains how Russian hackers spied on its executives
A test environment without two-factor authentication led to Microsoft's corporate systems getting popped open.
January 26, 2024Source

Microsoft reveals how hackers breached its Exchange Online accounts
Microsoft confirmed that the Russian Foreign Intelligence Service hacking group, which hacked into its executives' email accounts in November 2023, also breached other organizations as part of this malicious campaign.
January 26, 2024Source

Microsoft says Russian hackers also targeted other organizations
On Friday, Microsoft revealed that it had been the victim of a hack carried out by Russian government spies. Now, a week later, the technology giant said that it was not the only target of the espionage operation.
January 26, 2024Source

Microsoft Says Test Account Gave Hackers Keys to the Kingdom
Postmortem: Multiple Customers Also Targeted by Russian Nation-State Attackers
January 26, 2024Source or Source or Source or Source or Source

Nozomi Unveils Wireless Security Sensor for OT, IoT Environments
Nozomi Networks extends its offering with Guardian Air, a security sensor designed to help organizations detect wireless threats in OT and IoT.
January 26, 2024Source

Pet technology, meant to provide help and security for pets and owners, has vulnerabilities of its own
Pet owners are increasingly turning to technology for various pet care purposes such as feeding, health monitoring and activity and movement tracking. Much of this technology operates via devices and apps connected to the Internet of Things (IoT), thereby presenting privacy and security risks to those who use them.
January 26, 2024Source

Ring now blocks police from accessing video doorbell/camera footage
Consumer-level surveillance has been huge since it doesn't take much to set up your own security camera system at home thanks to brands like Ring. You don't even have to have local storage space anymore as most of today's options offer fancy cloud services. This keeps your home safe but can also help secure the area around your home as well.
January 26, 2024Source

Russian TrickBot Malware Developer Sentenced to Prison in US
Vladimir Dunaev sentenced to 5 years in prison after admitting to participating in the development and distribution of the TrickBot malware.
January 26, 2024Source

The life and times of Cozy Bear, the Russian hackers who just hit Microsoft and HPE
Hacks by Kremlin-backed group continue to hit hard.
January 26, 2024Source

Therapy Provider Notifying 4 Million Patients of PJ&A Hack
Concentra Health Services Joins List of Those Affected in Transcriber's Data Breach
January 26, 2024Source or Source or Source or Source or Source

Use ML and Streamlit for User and Entity Behavior Analytics
User and Entity Behavior Analytics (UEBA) is a proven behavior-based insider risk-detection solution within the security community. However, without cloud computing and its big data handling capabilities, machine learning (ML)-the crux of UEBA-cannot be robustly practiced, making it difficult to take note of normal conducts of users in scale while being able to catch anomalous behaviors promptly.
January 26, 2024Source

Wait, security courses aren't a requirement to graduate with a computer science degree?
And software makers seem to be OK with this, apparently
January 26, 2024Source

Weasel Words Rule Too Many Data Breach Notifications
'The Security of Our Customers' Data Is Our Top Priority' - Really?
January 26, 2024Source or Source or Source or Source

Westermo Switch Vulnerabilities Can Facilitate Attacks on Industrial Organizations
CISA informs organizations that Westermo Lynx switches are affected by eight vulnerabilities and some devices are reportedly exposed to the internet.
January 26, 2024Source

Internet — Security Issues — January 24th, 2024

340,000 Jason's Deli Customers Potentially Impacted by Credential Stuffing Attack
Jason's Deli says hackers targeted users in credential stuffing attacks, likely compromising their personal information
January 24, 2024Source

Amazon's French Warehouses Fined Over Employee Surveillance
France's data protection agency fines Amazon's French warehouses unit 32 million euros ($34.9 million) for "excessively intrusive" employee surveillance system.
January 24, 2024Source

Booking.com Malware alarm at Sophos Firewalls
Brief question to the administrators who have a Sophos firewall under their administration. You have received more malware alarms there in the last few days? An administrator contacted me yesterday by email because his customer systems with Sophos firewalls are increasingly delivering messages about malware. It seems to be related to ads from booking-com advertising windows.
January 24, 2024Source

Bugcrowd sees 30 percent increase in web vulnerability submissions
Crowdsourced security platform Bugcrowd's latest Vulnerability Trends Report finds that the hacker community recorded a 30 percent increase in web vulnerability submissions on the platform compared to 2022.
January 24, 2024Source

CISO Conversations: The Legal Sector With Alyssa Miller at Epiq and Mark Walmsley at Freshfields
SecurityWeek talks to legal sector CISOs Alyssa Miller at Epiq and Mark Walmsley at Freshfields Bruckhaus Deringer
January 24, 2024Source

Cyber League: UK's NCSC Calls on Industry Experts to Join its Fight Against Cyber Threats
The United Kingdom's National Cyber Security Centre is inviting members of the cybersecurity community to join its new Cyber League, which is a collective of industry experts that will work alongside the government agency to tackle security threats facing the U.K.
January 24, 2024Source

Cyberpunk 2077 Player Discovers a Very on Brand Secret Message Hidden Within the Game
"Gra imperi mali."
January 24, 2024Source

Fortra GoAnywhere MFT Flaw Grants Admin Access to Anyone
'/..;/' Strikes Again
January 24, 2024Source or Source or Source or Source or Source

GSA Sparks Security Fears After Buying Risky Chinese Cameras
Experts Warn Against Increasing Federal Reliance on Chinese Technology
January 24, 2024Source or Source or Source or Source or Source

HPE: Russian hackers breached its security team's email accounts
Hewlett Packard Enterprise (HPE) disclosed today that suspected Russian hackers known as Midnight Blizzard gained access to the company's Microsoft Office 365 email environment to steal data from its cybersecurity team and other departments.
January 24, 2024Source

Major IT outage at Europe's largest caravan and RV club makes for not-so-happy campers
1 million members still searching for answers as IT issues floor primary digital services
January 24, 2024Source

Major US, UK Water Companies Hit by Ransomware
Two major water companies, Veolia in the US and Southern Water in the UK, have been targeted in ransomware attacks that resulted in data breaches.
January 24, 2024Source

Massive leak exposes 26 billion records in mother of all breaches
It includes data from Twitter, Dropbox, and LinkedIn
January 24, 2024Source

Medical Lab Database Exposed 1.3M Records, COVID Test Info
Researcher Reported Configuration Issue to Cloud Vendor After Lab Failed to Respond
January 24, 2024Source or Source or Source or Source or Source

PoC Code Published for Just-Disclosed Fortra GoAnywhere Vulnerability
PoC code exploiting a critical Fortra GoAnywhere MFT vulnerability gets published one day after public disclosure.
January 24, 2024Source

PoC for easily exploitable Fortra GoAnywhere MFT vulnerability released (CVE-2024-0204)
Proof-of-concept (PoC) exploit code for a critical vulnerability (CVE-2024-0204) in Fortra's GoAnywhere MFT solution has been made public, sparking fears that attackers may soon take advantage of it.
January 24, 2024Source

Ransomware on Tap as Major Water Providers Fall Victim
US and UK Water Giants Report Network Breaches and Data Leaks, But No Encryption
January 24, 2024Source or Source or Source or Source

Ring Ends Controversial 'Request for Assistance' Tool Used by the Police
The tool, built into Ring's mobile apps, made it easy for law enforcement to ask Ring users to share video footage
January 24, 2024Source

Securiti collaborates with Lacework to improve data protection in the cloud
Securiti and Lacework announced a strategic partnership that allows customers to be smarter than ever when protecting cloud data.
January 24, 2024Source

Stack Identity expands its platform with ITDR to tackle shadow access and shadow identities
Stack Identity has unveiled the expansion of the Identity Access Risk Management Platform with identity threat detection and response (ITDR) to tackle shadow access and shadow identities.
January 24, 2024Source

Stellar Cyber partners with Proofpoint to speed detection of email-driven cyberattacks
Stellar Cyber announced a new partnership with Proofpoint, a cybersecurity and compliance company.
January 24, 2024Source

UK Intelligence Agency Warns of Mounting AI Cyberthreat
British Lawmakers Call on Government to Boost Protections From AI Scams
January 24, 2024Source or Source or Source or Source or Source

US, UK, Australia Sanction Russian Man Over Ransomware Attack on Healthcare Insurer
US, UK and Australia announce sanctions against Alexander Ermakov for his role in the 2022 ransomware attack on healthcare insurer Medibank.
January 24, 2024Source

Internet — Security Issues — January 22nd, 2024

Apparel supplier for North Face, Vans admits its cyberattack led to a data breach of 35 million customers
VF Corp said in December the attack slowed holiday fulfillment.
January 22, 2024Source

Cognyte adds GenAI capabilities into its LUMINAR offering
Cognyte announced the release of a significant update to its LUMINAR external threat intelligence solution to incorporate GenAI capabilities, including a new AI-driven dashboard.
January 22, 2024Source

Carnegie Mellon reveals it was hit by a cyberattack over the summer
About 7,000 students, employees, contractors and more were impacted.
January 22, 2024Source

How to check whether your email address is being misused, and what to do next
Over 70 million new, compromised email addresses at haveibeenpwned.
January 22, 2024Source

LoanDepot discloses that hackers breached personal data of 16 million customers
A ransomware attack against the mortgage lender slowed down the business for over a week.
January 22, 2024Source

Attackers can steal NTLM password hashes via calendar invites
A recently patched vulnerability in Microsoft Outlook (CVE-2023-35636) that can be used by attackers to steal users' NTLM v2 hashes can be exploited by adding two headers to an email carrying a specially crafted file, security researcher Dolev Taler has shared on Friday.
January 22, 2024Source

Chinese Spies Exploited VMware vCenter Server Vulnerability Since 2021
CVE-2023-34048, a vCenter Server vulnerability patched in October 2023, had been exploited as zero-day for a year and a half.
January 22, 2024Source

Cracked macOS apps drain wallets using scripts fetched from DNS records
Hackers are using a stealthy method to deliver to macOS users information-stealing malware through DNS records that hide malicious scripts.
January 22, 2024Source

F5 appoints Samir Sherif as CISO
F5 announced the appointment of Samir Sherif as SVP and CISO. In this role, Sherif will lead F5's enterprise cybersecurity strategy and security culture, evolve F5's security capabilities and resilience, oversee cybersecurity standards and programs for F5's products and services, and showcase to customers and the broader industry the value of F5's security solutions.
January 22, 2024Source

France's OFAC to Tackle Cyberthreats Ahead of Olympics
French Police Office for Cybercrime Has a Staff of 180
January 22, 2024Source or Source or Source or Source or Source

Hackers start exploiting critical Atlassian Confluence RCE flaw
Security researchers are observing exploitation attempts for the CVE-2023-22527 remote code execution flaw vulnerability that affects outdated versions of Atlassian Confluence servers.
January 22, 2024Source

Hackers Targeting Critical Atlassian Confluence Vulnerability Days After Disclosure
The Atlassian Confluence vulnerability CVE-2023-22527 is being exploited in the wild just days after it was disclosed.
January 22, 2024Source

LoanDepot Breach: 16.6 Million People Impacted
Lending giant LoanDepot said that roughly 16.6 million individuals were impacted as a result of a ransomware attack.
January 22, 2024Source

loanDepot cyberattack causes data breach for 16.6 million people
Mortgage lender loanDepot says that approximately 16.6 million people had their personal information stolen in a ransomware attack disclosed earlier this month.
January 22, 2024Source

LoanDepot Ransomware Attack: 16.6 Million Customers Affected
Customers 'Sensitive Personal Information' Stolen, Large Mortgage Lender Reports
January 22, 2024Source or Source or Source or Source or Source

LoanDepot says 16.6M customers had 'sensitive personal' information stolen in cyberattack
About 16.6 million LoanDepot customers had their "sensitive personal" information" stolen in a cyberattack earlier this month, which the loan and mortgage giant has described as a ransomware attack.
January 22, 2024Source

Microsoft says state-backed Russian hackers accessed emails of senior leadership team members
State-backed Russian hackers broke into Microsoft's corporate email system and accessed the accounts of members of the company's leadership team, as well as those of employees on its cybersecurity and legal teams, the company said Friday.
January 22, 2024Source

Multiple Vulnerabilities in VMware Products Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in VMware vCenter Server and Cloud Foundation, the most severe of which could allow for remote code execution. VMware vCenter Server is the centralized management utility for VMware.
January 22, 2024Source

Netskope introduces SASE solution for midmarket enterprises
Netskope announced the next addition to its family of single-vendor SASE offerings, focused on midmarket organizations and the Managed Service Providers (MSP) that serve them.
January 22, 2024Source

New method to safeguard against mobile account takeovers
Computer science researchers have developed a new way to identify security weaknesses that leave people vulnerable to account takeover attacks, where an attacker gains unauthorized access to online accounts.
January 22, 2024Source

New NTLM Hash Leak Attacks Target Outlook, Windows Programs
Varonis finds one vulnerability and three attack methods that can be used to obtain NTLM hashes via Outlook and two Windows programs.
January 22, 2024Source

On Point: Offensive Security for Mobile Network Operators
Build Resiliency by Simulating Real-World Attacks and Gaining Insight Into Threats
January 22, 2024Source or Source or Source or Source or Source

Owner of Cybercrime Website BreachForums Sentenced to Supervised Release
Conor Brian Fitzpatrick, the owner of the cybercrime website BreachForums, was sentenced to time served and supervised release.
January 22, 2024Source

Prosecutors Add to Evidence Against Alleged Vastaamo Hacker
Extortion Money Found in Bank Account of Aleksanteri Kivimaki, Prosecutors Say
January 22, 2024Source or Source or Source or Source or Source

Ransomware Hit on Tietoevry Causes IT Outages Across Sweden
Finnish IT Services Previews Days or Weeks of Disruption, Ties Attack to Akira
January 22, 2024Source or Source or Source or Source or Source

Report: Hackers Scammed $7.5M From HHS Grant Payment System
Money Meant for Poor Communities Stolen as Authorities Issued Phishing Scam Alerts
January 22, 2024Source or Source or Source or Source or Source

Resecurity and Cybercrime Atlas join forces to disrupt cybercriminal operations
In an era where cybercrime poses a pervasive threat to individuals, corporations, and governments worldwide, Resecurity and Cybercrime Atlas have forged a partnership aimed at disrupting the global cybercriminal ecosystem.
January 22, 2024Source

Russian hackers accessed Microsoft's corporate network for a month
Poor secure configuration exposed the software and AI giant to information exfiltration
January 22, 2024Source

Security Experts Describe AI Technologies They Want to See
SecurityWeek interviews a wide spectrum of security experts on AI-driven cybersecurity use-cases that are worth immediate attention.
January 22, 2024Source

Slug slimes aerospace biz AerCap with ransomware, brags about 1TB theft
Loanbase admits massive loss of customer data to thieves, too
January 22, 2024Source

Tech Moves: Nintex founder named CEO at WellSaid Labs; F5 hires CISO; Slalom appoints execs
Brian Cook, former CEO of Nintex and founder of Incredible Capital, is now CEO of WellSaid Labs, a Seattle startup developing AI synthetic voice technology.
January 22, 2024Source

Tietoevry ransomware attack halts Swedish organizations
Finnish IT software and service company Tietoevry has suffered a ransomware attack that affected several customers of one of its datacenters in Sweden.
January 22, 2024Source

Internet — Security Issues — January 19th, 2024

2 Free Courses for Learning a Proven Risk Assessment Method
Our team has already worked with Salesforce Trailhead to release an introduction to our CIS Critical Security Controls (CIS Controls) v8. Much of that course revolved around Implementation Group 1 (IG1), or what we define as essential cyber hygiene. Specifically, it discussed how maintaining an inventory of assets, implementing access controls, defending against malware, raising security awareness, and other activities help to support essential cyber hygiene.
January 19, 2024Source

3 Ways to Use CIS Cloud Security Resources on the AWS Cloud
It's obvious that the remote capabilities of the modern day office have transformed permanently. Most organizations will see an increase in hybrid remote work, which means utilizing the public cloud is critical. Customer security in the cloud remains an important part of that growth. The Center for Internet Security (CIS), in conjunction with Amazon Web Services (AWS), continues to enhance security for the AWS Cloud since 2015.
January 19, 2024Source

4 Business Goals You Can Achieve While Scaling Cybersecurity
Recently, I discussed how taking a layered approach to cybersecurity scaling helps organizations in the long term. Doing so enables them to implement complementary security controls that protect what's important to the business. By extension, they can use cybersecurity to support, not hinder, profitable business growth as their priorities evolve and their digital footprint grows.
January 19, 2024Source

4 Reasons SLTTs use Network Monitoring Systems
Ransomware attacks targeting U.S. State, Local, Tribal, and Territorial government entities (SLTTs) have been on the rise since 2018. It is essential for these organizations to have a comprehensive cyber defense program in place. From creating incident response plans and offering cybersecurity training, to implementing a network security monitoring service for identifying malicious activity -- each piece plays an important part in a true defense in depth strategy to protect the information and data of citizens.
January 19, 2024Source

5 Cybersecurity Hurdles Facing Public Sector (SLTT) CISOs (and 5 Way to Help)
Public sector Chief Information Security Officers (CISOs) face the same challenges as their private sector counterparts, but with the additional struggles that are unique to working in government.
January 19, 2024Source

5 Ongoing Cybersecurity Concerns and How SLTTs Can Beat Them
Malicious actors are increasingly targeting U.S. State, Local, Tribal, and Territorial (SLTT) government organizations. A recent report from BlueVoyant (PDF) found that cyber-attacks targeting state and local government organizations, in particular, rose an average of 50% between 2017 and 2020. It added that the actual rate of growth could be much higher.
January 19, 2024Source

5 Tips to Harden Your OS On-Prem or in the Cloud
Cloud security is just as vital as on-premises security. Hundreds of security recommendations may exist to harden your Operating Systems (OS). That's why it's important to use industry recognized guidelines to harden your OS. To give you a taste, we pulled five recommendations from the CIS Benchmark for Microsoft Windows Server 2019 -- objective, consensus-driven security configuration guidelines.
January 19, 2024Source

5 Tips to Stay Secure Online in the Office or at Home
Whether you are in the office or working from home, cybersecurity is everyone's responsibility. Check out the infographic below for tips to stay secure online and improve your workplace cybersecurity posture. By following simple online safety best practices, you can avoid becoming the next victim of a cyber attack.
January 19, 2024Source

6 New Policy Templates to Help You Enact CIS Controls IG1
Many security frameworks require that enterprises begin with creating a policy. A policy identifies procedures that implementers can use to meet the requirements of a security standard. As such, a policy helps to formalize one or more security controls as ongoing processes instead of ad hoc engagements, which provides better protection to an enterprise and its data.
January 19, 2024Source

6 Questions for Building and Scaling a Cybersecurity Plan
Creating a cybersecurity plan is the first step in starting secure and staying secure. Consider this when planning a budget, getting support from staff, and creating company goals. Here are six essential questions to ask yourself when getting started.
January 19, 2024Source

18 is the New 20: CIS Critical Security Controls v8 is Here!
The moment we've all been waiting for is finally here. The Center for Internet Security (CIS) officially launched CIS Critical Security Controls (CIS Controls) v8, which was enhanced to keep up with evolving technology (modern systems and software), evolving threats, and even the evolving workplace. The pandemic changed a lot of things, and it also prompted changes in the CIS Controls.
January 19, 2024Source

2021 Cybersecurity Trends to Prepare For
While few people foresaw the dramatic developments of the past year, CIS experts interviewed in 2020 identified several cybersecurity trends that persisted or even accelerated in the midst of the COVID-19 pandemic.
January 19, 2024Source

2021 NCSR: SLTTs Struggle with Supply Chain, Risk Management
Cyber attacks targeting U.S. State, Local, Tribal, and Territorial (SLTT) government organizations increased significantly in 2022. In a mid-year update to the 2022 SonicWall Cyber Threat Report, for instance, researchers found that ransomware affecting government organizations rose 1,885%, eclipsing the combined growth in attacks against healthcare (755%), education (152%), and retail (21%).
January 19, 2024Source

2022 Cybersecurity Predictions to Watch Out For
As eventful as 2020 was -- with the world of work turned upside down, thanks to COVID-19 -- 2021 was equal to its predecessor. It was a year that bounced from hope to cautious optimism, then back to disquiet. While some of our cybersecurity predictions for 2021 were accurate, like the importance of securing the remote workforce and the ever-increasing sophistication of ransomware, the year came to a close as organizations are forced to address the significant challenges of dealing with the Log4j vulnerability.
January 19, 2024Source

35.5 Million Customers Affected by Apparel Maker VF's Breach
Owner of Such Brands as North Face and Vans Says Business Mostly Back to Normal
January 19, 2024Source or Source or Source or Source or Source

$40 billion worth of crypto crime enabled by stablecoins since 2022
Stablecoins like Tether also used for scams and sanctions evasion.
January 19, 2024Source

71 Million Unique Emails Found in Naz.api Cybercrime Dump
Information-Stealing Malware Continues to Amass Fresh Credentials, Experts Warn
January 19, 2024Source or Source or Source

A Blueprint for Ransomware Defense Using the CIS Controls
If the past few years are any indication, ransomware attacks aren't going away anytime soon. In a 2022 report, SonicWall revealed that it had detected more than 623 million ransomware attacks over the course of 2021 -- an increase of 105% over the previous year. By comparison, it observed just 188 million ransomware attacks back in 2019. This means that ransomware detections more than tripled in the span of three years.
January 19, 2024Source

A means for tuning friction on a flat surface without the use of math
A team of microsystems engineers at Universite de Lyon, ecole Centrale de Lyon has developed a method to create a desired amount of friction between two flat surfaces without resorting to math.
January 19, 2024Source

A nature-based solution to restore and adapt western US dry forests to climate change
Nature effectively "managed" forests through millennia of major climate changes and episodes of natural disturbances (e.g., wildfires, droughts, bark-beetle outbreaks), so why would nature not now be best able to restore and adapt forests to climate change?
January 19, 2024Source

A New Beginning for Election Security Journeys
In March 2018, the Center for Internet Security (CIS) published A Handbook for Election Infrastructure Security. The purpose of the Handbook was to provide election officials with clear and concise guidance from a recognized leader in cybersecurity.
January 19, 2024Source

A Snapshot of CIS's Work to Strengthen macOS Security
Every day, the Center for Internet Security (CIS) facilitates the development of hardening guidelines that teams can use to secure their organization's systems. These CIS Benchmarks wouldn't be possible without the participation of volunteer subject matter experts around the world. The same goes for the technology vendors themselves.
January 19, 2024Source

Abusing Scheduled Tasks with Living off the Land Attacks
Living off the Land (LotL) attacks involve the use of existing tools and tactics on targeted systems or networks to carry out a cyber attack. Why do attackers use LotL techniques? It's simple. These techniques are easily accessible, capable of evading detection, highly adaptive, and supportive of automation. According to CrowdStrike's 2022 Global Threat Report, 62% of attackers are using LotL tools or techniques in their attacks.
January 19, 2024Source

Advancing Hardened Systems in the AWS Cloud
Cloud security remains an ongoing challenge for organizations. In The State of Security 2022, four out of five respondents told Splunk that they don't fully understand their duties under the shared responsibility model.
January 19, 2024Source

Align to a Framework: Plan a Cybersecurity Roadmap's Route
In a previous blog post, Tony Sager explained how knowing your needs helps you get packing for a cybersecurity roadmap. This is essential whether you're creating a roadmap for your organization and/or whether you're working with your clients to meet their needs.
January 19, 2024Source

Announcing CIS Endpoint Security Services for SLTTs
U.S. State, Local, Tribal, and Territorial (SLTT) organizations face a stark challenge in mounting a proper cybersecurity defense against malicious actors whose attacks continue to increase in sophistication and volume. The trend toward persistent remote and hybrid work models further complicates an organization's cybersecurity program, widening the attack surface as SLTT employees increasingly work from home, outside the protection of organizational networks.
January 19, 2024Source

Assess, Remediate, and Implement with CIS SecureSuite
The world relies on technology. So, a strong cybersecurity program is more important than ever. The challenge of achieving good cyber hygiene can be especially acute for small- and medium-sized businesses. This is particularly true for those with fully remote or hybrid work environments. Add to the mix limited resources and limited talent focused on cybersecurity, and the challenges can seem overwhelming.
January 19, 2024Source

Avoid Cloud Misconfigurations with CIS Hardened Images
Organizations with cloud workloads need to protect themselves against a variety of risks. While most organizations focus on security against hackers, breaches resulting from simple misconfigurations can be just as damaging.
January 19, 2024Source

Back to Normal? Remember Cybersecurity Awareness Training!
Many offices are opening their doors and welcoming employees back to the workplace for the first time since the COVID-19 pandemic started. The transition from home to the office will likely be as difficult as the transition from the workplace to a work-from-home environment a year ago. Old routines may have to be relearned, and new rules accommodated, especially regarding safety and security. A refresher course in cybersecurity will be a great way to help employees get back in the swing, and recall security best practices they may have forgotten.
January 19, 2024Source

Breaking Down the BlackCat Ransomware Operation
The BlackCat ransomware group is making quite a name for itself. In a FLASH alert published in April 2022, the FBI revealed that the operation had infected more than 60 victims since first surfacing in mid-November 2021.
January 19, 2024Source

Bringing Multi-Cloud Security to VMWare Explore 2022
The theme of VMWare Explore 2022 U.S. is "Map Your Multi-Cloud Journey." This is an important topic for organizations everywhere. If they don't think strategically about their multi-cloud environments, they might find themselves paying for resources they don't need, creating unnecessary complexities for stakeholders, and leaving their systems and data at risk of exposure.
January 19, 2024Source

Brute Ratel: The New Red Teaming Tool Coopted by CTAs
Digital technology is inherently dual-use in that it can help someone fulfill legitimate or malicious purposes. There's no exception when it comes to adversary simulation software. Take Cobalt Strike as an example. Just as defenders are using this solution to test their organization's security defenses, so too are cyber threat actors (CTAs) seizing on the technology to penetrate their victims' networks.
January 19, 2024Source

CIS at the HIMSS Global Health Conference Aug 9-13!
The Center for Internet Security (CIS) is excited to be attending the upcoming HIMSS Global Health Conference & Exhibition in Las Vegas! Our cybersecurity experts will be on-site to help healthcare industry professionals understand the low- and no-cost resources available from CIS to help them secure their organizations against today's most persistent cyber threats, including ransomware.
January 19, 2024Source

CISA Directs Agencies to Mitigate Ivanti Zero-Day Exploits
US Agencies Told to Remove Ivanti's Affected Products From Federal Networks
January 19, 2024Source or Source or Source or Source or Source or Source

CISA Issues Emergency Directive on Ivanti Zero-Days
The US government's cybersecurity agency CISA ramps up the pressure on organizations to mitigate two exploited Ivanti VPN vulnerabilities.
January 19, 2024Source

Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data
For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. Reporting by 404 Media recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant.
January 19, 2024Source

Critical Vulnerabilities Found in Open Source AI/ML Platforms
Security researchers flag multiple severe vulnerabilities in open source AI/ML solutions MLflow, ClearML, Hugging Face.
January 19, 2024Source

Cyberattack targeting UK councils causes online disruption
Three councils in the United Kingdom have taken some of their public-facing systems offline due to an ongoing cybersecurity issue.
January 19, 2024Source

Finnish Hacker Denies Role In Psychotherapy Clinic Attack
Aleksanteri Kivimäki Disputed In Court Evidence Collected by Police
January 19, 2024Source or Source or Source or Source or Source

Groups Urge FTC to Scrutinize Google Location Data Practices
Complaint Alleges Tech Giant Is Breaking Privacy Promises, Putting Patients at Risk
January 19, 2024Source or Source or Source or Source or Source

ISMG Editors: Why Are Crypto Phishing Attacks Surging?
Legal Moves: Crypto Theft Lawsuit; Hospital Sues LockBit Gang
January 19, 2024Source or Source or Source or Source or Source

Ivanti EPMM and MobileIron Core vulnerability is actively exploited, CISA confirms (CVE-2023-35082)
A previously patched critical vulnerability (CVE-2023-35082) affecting Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core is being actively exploited, the Cybersecurity and Infrastructure Security Agency (CISA) has confirmed by adding the vulnerability to its Known Exploited Vulnerabilities Catalog (KEV).
January 19, 2024Source

Ivanti EPMM Vulnerability Targeted in Attacks as Exploitation of VPN Flaws Increases
The number of Ivanti VPN appliances compromised through exploitation of recent flaws increases and another vulnerability is added to exploited list.
January 19, 2024Source

LoanDepot outage drags into second week after ransomware attack
LoanDepot customers say they have been unable to make mortgage payments or access their online accounts following a suspected ransomware attack on the company last week.
January 19, 2024Source

Microsoft 'senior leadership' emails accessed by Russian SolarWinds hackers
Microsoft suffered a nation-state attack just days after announcing a major software security overhaul.
January 19, 2024Source

PHMSA Launches Initiatives to Bolster Pipeline Cybersecurity
Agency Tasked With Pipeline Security Takes New Steps to Combat Rise in Cyberattacks
January 19, 2024Source or Source or Source or Source

Securing Applications in ROKS Cluster
Ensure heightened security for applications in the ROKS Cluster by employing Istio Egress Gateway and routing through edge nodes for an added layer of protection.
January 19, 2024Source

Securing Digital Frontiers: The Essential Role of Network Access Control in Modern Cybersecurity
Network Access Control is key in barring unauthorized entries, improving network visibility, enhancing cybersecurity readiness, and aligns with the Zero Trust approach.
January 19, 2024Source

Supporting Your Secure Cloud Goals: Our 2023 Year in Review
As 2023 wrapped up, you might have taken a moment to review all you did to secure your organization's cloud environments last year. My team and I did something like this, only we looked at it from the perspective of how we helped you meet your cloud security goals. Several initiatives and releases stood out from our year in review.
January 19, 2024Source

Threat Modeling: Navigating Cybersecurity Challenges
This analysis delves into the intricacies of threat modeling, exploring its mechanisms, methodologies, real-world applications, benefits, and challenges.
January 19, 2024Source

US Charges Russian Involved in 2013 Hacking of Neiman Marcus, Michaels
US charges Russian cybercriminals, including man allegedly involved in hacking of Neiman Marcus and Michaels Stores in 2013.
January 19, 2024Source

US Gov Publishes Cybersecurity Guidance for Water and Wastewater Utilities
CISA, FBI and EPA document aims to help water and wastewater organizations improve their cyber resilience and incident response.
January 19, 2024Source

Vans, North Face owner says ransomware breach affects 35 million people
VF Corporation, the company behind brands like Vans, Timberland, The North Face, Dickies, and Supreme, said that more than 35 million customers had their personal information stolen in a December ransomware attack.
January 19, 2024Source

VF Corp Says Data Breach Resulting From Ransomware Attack Impacts 35 Million
Apparel and footwear brands owner VF Corp shares more details on the impact of a December 2023 ransomware attack.
January 19, 2024Source

VMware vCenter Server Vulnerability Exploited in Wild
VMware warns customers that CVE-2023-34048, a vCenter Server vulnerability patched in October 2023, is being exploited in the wild.
January 19, 2024Source

White House Official Warns of AI Risks in 2024 Elections
No 'Magic Solution' to Prevent Malicious Use of AI in Elections, OSTP Chief Says
January 19, 2024Source or Source or Source or Source or Source

XDR and the Benefits of Managed Services
Port53 Technologies President Omar Zarabi on XDR Partnership with Cisco
January 19, 2024Source or Source or Source or Source or Source

Internet — Security Issues — January 18th, 2024

2024 cybersecurity predictions: The continued rise of AI and regulation
The last 12 months have been seismic for cybersecurity, with successful hacks and breaches continuing to make front-page news. The task of keeping networks and data safe is an ever-evolving one, with hackers and cybersecurity professionals in a constant state of cat-and-mouse as they try to outsmart one another.
January 18, 2024Source

A simple technique to defend ChatGPT against jailbreak attacks
Large language models (LLMs), deep learning-based models trained to generate, summarize, translate and process written texts, have gained significant attention after the release of Open AI's conversational platform ChatGPT. While ChatGPT and similar platforms are now widely used for a wide range of applications, they could be vulnerable to a specific type of cyberattack producing biased, unreliable or even offensive responses.
January 18, 2024Source

AHA: Rise in Scams Targeting IT Help Desks for Payment Fraud
American Hospital Association Warns of Social Engineering Schemes
January 18, 2024Source or Source or Source or Source or Source

Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More
The Androxgh0st malware botnet is used for victim identification and exploitation in targeted networks, as well as credentials collection. Read the FBI/CISA's tips for protecting against this malware threat.
January 18, 2024Source

Bosch Fixes Torque Wrenches That Could Be Hacked To Display Incorrect Specs
Rexroth, a Bosch subsidiary, had to update nutrunners popular with automakers because hackers could take control of the tools.
January 18, 2024Source

Credentials are Still King: Leaked Credentials, Data Breaches and Dark Web Markets
Infostealer malware is one of the most substantial and underappreciated risk vectors for corporate information security teams. Infostealers infect computers, steal all of the credentials saved in the browser along with active session cookies and other data, then export it back to command and control (C2) infrastructure before, in some cases, self-terminating.
January 18, 2024Source

Cryptohack Roundup: SEC Still Probing X Account Hack
Also: $3.3M Socket Hack; Do Kwon and Alex Mashinsky Trials
January 18, 2024Source or Source or Source or Source or Source

Customer Information of Toyota Insurance Company Exposed Due to Misconfigurations
Exposed credentials for an email address at an Indian Toyota insurance broker led to customer information compromise.
January 18, 2024Source

EFF's 2024 In/Out List
Since EFF was formed in 1990, we've been working hard to protect digital rights for all. And as each year passes, we've come to understand the challenges and opportunities a little better, as well as what we're not willing to accept.
January 18, 2024Source

Energy Department to Invest $30 Million in Clean Energy Cybersecurity Solutions
Organizations can earn up to $3 million in federal funding for cyber tools securing the clean energy infrastructure.
January 18, 2024Source

ESET launches MDR service to improve cybersecurity for SMBs
ESET launched ESET MDR, an innovative solution aimed at addressing the evolving cybersecurity challenges faced by SMBs.
January 18, 2024Source

Google TAG: Kremlin cyber spies move into malware with a custom backdoor
The threat hunters believe COLDRIVER has used SPICA since at least November 2022
January 18, 2024Source

Google: Russian FSB hackers deploy new Spica backdoor malware
Google says the ColdRiver Russian-backed hacking group is pushing previously unknown backdoor malware using payloads masquerading as a PDF decryption tool.
January 18, 2024Source

Healthcare experienced more cyberattacks than any other sector in 2023
Putting patients' lives at risk can mean a more lucrative payout for cybercriminals
January 18, 2024Source

How to Find the IMEI Serial Number on Your iPhone
Every phone is linked with a unique alphanumeric code called IMEI or EID. It is like your phone's social security number. The IMEI is used to identify iPhone. Unlike SIM cards, IMEI cannot be changed. Let us learn how to find IMEI and EID on any iPhone model.
January 18, 2024Source or Watch Video

Iranian Hackers Targeting Middle East Experts
Tehran-Aligned Group Mint Sandstorm Uses Israel-Hamas Conflict as a Lure
January 18, 2024Source or Source or Source or Source or Source

Jamf discovers new malware disguised as popular macOS apps
Threat allows attacker to control a compromised Mac.
January 18, 2024Source

JPMorgan exec claims bank repels '45 billion' cyberattack attempts per day
Assets boss also reckons she has more engineers than Amazon
January 18, 2024Source

Kansas State University cyberattack disrupts IT network and services
Kansas State University (K-State) announced it is managing a cybersecurity incident that has disrupted certain network systems, including VPN, K-State Today emails, and video services on Canvas and Mediasite.
January 18, 2024Source

List Containing Millions of Credentials Distributed on Hacking Forum, but Passwords Old
Naz.API credential stuffing list containing 70 million unique email addresses and old passwords found on hacking forum.
January 18, 2024Source

N-able MDR ingests data from existing security and IT tools
N-able continues to advance its security suite with the launch of N-able Managed Detection and Response (MDR).
January 18, 2024Source

Oleria raises $33 million to accelerate its product innovation
Oleria has raised $33.1 million in a Series A funding round. This latest investment, which brings the company's total funding to over $40 million, is led by Evolution Equity Partners with participation from Salesforce Ventures, Tapestry VC, and Zscaler.
January 18, 2024Source

Oracle Quarterly Critical Patches Issued January 16, 2024
Multiple vulnerabilities have been discovered in Oracle products, the most severe of which could allow for remote code execution.
January 18, 2024Source

Outsmarting Ransomware's New Playbook
Encryption is a technological necessity and also a legal safeguard, with importance in both defending against and mitigating the consequences of cyberattacks.
January 18, 2024Source

Poorly secured PostgreSQL, MySQL servers targeted by ransomware bot
Users exposing poorly secured PostgreSQL and MySQL servers online are in danger of getting their databases wiped by a ransomware bot, Border0 researchers are warning.
January 18, 2024Source

Privacy Fines: Tech Hub Ireland Leads EU in GDPR Sanctions
4.7 Billion Euros in Total Known Fines Since Data Protection Law Took Effect
January 18, 2024Source or Source or Source or Source or Source

Quantum computing to spark 'cybersecurity Armageddon,' IBM says
Governments and businesses are not prepared for the havoc quantum computers will sow in cybersecurity by the end of the decade, according to an International Business Machines Corp. executive.
January 18, 2024Source

Ransomware attacks hospitalizing security pros, as one admits suicidal feelings
Untold harms of holding the corporate perimeter revealed in extensive series of interviews
January 18, 2024Source

Ransomware Group Targets Foxconn Subsidiary Foxsemicon
Foxsemicon's website defaced with a message from the LockBit ransomware group, which claims to have stolen 5 Tb of data.
January 18, 2024Source

Russian APT Known for Phishing Attacks Is Also Developing Malware, Google Warns
Russian threat group ColdRiver has developed Spica, a malware that enables it to compromise systems and steal information.
January 18, 2024Source

Security Report Blows The Whistle On A Massive Android TV Botnet Campaign
Botnet activities are usually sniffed out and found fairly routinely, but it seems that a previously unknown cybercrime gang named Bigpanzi has been laying low and getting away with it. New reports suggest that this gang has amassed a 170,000-device-strong botnet since 2015, developing along with it an admittedly impressively vast infrastructure network.
January 18, 2024Source

Software Supply Chain Security Startup Kusari Raises $8 Million
Kusari has raised $8 million to help organizations gain visibility into and secure their software supply chain.
January 18, 2024Source

Sourcepoint introduces sensitive data opt-in feature to prepare users for privacy changes
Sourcepoint has launched a sensitive data opt-in feature for its consent management platform (CMP) to help customers prepare for US privacy changes on the horizon.
January 18, 2024Source

Swimlane enhances Turbine platform to alleviate the pressure on SecOps teams
Swimlane announced its new Turbine innovations, Canvas and Hero AI. This transformative combination empowers security teams to build automation in seconds with limitless integration possibilities, leading to dramatic time and resource savings.
January 18, 2024Source

Swiss Government Reports Nuisance-Level DDoS Disruptions
Self-Proclaimed Russian Hacktivists Continue Putin-Aligned Information Operations
January 18, 2024Source or Source or Source or Source or Source

TeamViewer abused to breach networks in new ransomware attacks
Ransomware actors are again using TeamViewer to gain initial access to organization endpoints and attempt to deploy encryptors based on the leaked LockBit ransomware builder.
January 18, 2024Source

The importance of mental health in cyber security
Cybеr security professionals face stress, burnout and frustration which can affect their mental health and overall wellbeing
January 18, 2024Source

Unpatched Rapid SCADA Vulnerabilities Expose Industrial Organizations to Attacks
Seven vulnerabilities found in Rapid SCADA could be exploited to gain access to sensitive industrial systems, but they remain unpatched.
January 18, 2024Source

Vans, Supreme owner VF Corp says hackers stole 35 million customers' personal data
VF Corp., the parent company of the popular apparel brands Vans, Supreme, and The North Face, said Thursday that hackers stole the personal data of 35.5 million customers in a December cyberattack.
January 18, 2024Source

Vast botnet hijacks smart TVs for prime-time cybercrime
8-year-old op responsible for DDoS attacks and commandeering broadcasts to push war material
January 18, 2024Source

VMware: Plug critical Aria Automation hole immediately! (CVE-2023-34063)
A critical vulnerability (CVE-2023-34063) affecting VMware Aria Automation and VMware Cloud Foundation can be exploited by attackers to gain access to remote organizations and workflows, VMware has warned.
January 18, 2024Source

VulnCheck IP Intelligence identifies vulnerable internet-connected infrastructure
VulnCheck launched IP Intelligence, a new feature set designed to provide real-time tracking of attacker infrastructure and vulnerable IP's on the internet.
January 18, 2024Source

What is credential stuffing and how can I protect myself? A cybersecurity researcher explains
Cyber-skullduggery is becoming the bane of modern life. Australia's prime minister has called it a "scourge", and he is correct. In 2022--23, nearly 94,000 cyber crimes were reported in Australia, up 23% on the previous year.
January 18, 2024Source

Internet — Security Issues — January 17th, 2024

A non-proliferation solution: Using antineutrinos to surveil nuclear reactors
Nuclear power constitutes an essential source of energy in many countries worldwide, including France, U.S., China, and Japan, among others. While nuclear power plants have less environmental impact than coal power plants with regards to climate change, the technology employed in them can be used for undesirable purposes, namely the production of materials for nuclear weapons.
January 17, 2024Source

A Vulnerability in Atlassian Confluence Data Center and Server Could Allow for Remote Code Execution
A vulnerability has been discovered in Atlassian Confluence Server and Data Center which could allow for remote code execution. Confluence is a collaboration tool that brings people, knowledge, and ideas together in a shared workspace. Successful exploitation of this vulnerability could allow an attacker to create unauthorized Confluence administrator accounts to access the instance. An attacker could then preform administrator actions in the context of the confluence instance.
January 17, 2024Source

Achieving “Frictionless Defense” in the Age of Hybrid Networks
A “frictionless defense” is about integrating security measures seamlessly into the digital landscape to safeguard against threats while ensuring a positive user experience.
January 17, 2024Source

AI Data Exposed to ‘LeftoverLocals’ Attack via Vulnerable AMD, Apple, Qualcomm GPUs
Researchers show how a new attack named LeftoverLocals, which impacts GPUs from AMD, Apple and Qualcomm, can be used to obtain AI data.
January 17, 2024Source

Apple Silicon Security Flaw Discovered in iPhone 12 and M2 MacBook Air
A security vulnerability that could allow attackers to access sensitive data has been discovered in some Apple silicon GPUs.
January 17, 2024Source

Bigpanzi botnet infects 170,000 Android TV boxes with malware
A previously unknown cybercrime syndicate named 'Bigpanzi' has been making significant money by infecting Android TV and eCos set-top boxes worldwide since at least 2015.
January 17, 2024Source

Chrome Patches First Zero-Day of 2024 Exploited in the Wild
Google Fixes Out-of-Bounds Memory Access Flaw; Microsoft Edge Browser Also Affected
January 17, 2024Source or Source or Source or Source or Source

Did Uber's Delivery Service Drizly Die Due to Data Breach?
Closing of the Alcohol Delivery Service Follows Federal Crackdown for Poor Security
January 17, 2024Source or Source or Source or Source or Source

Emerging technology is creating new fraud risks, but consumer distrust in AI protection grows
ComplyAdvantage has released its annual report, "The State of Financial Crime 2024," focusing on the rising trend of artificial intelligence being exploited for fraudulent activities. The report also reveals that, despite consumer apprehension about AI, many financial institutions are investing in technology to tackle this emerging threat.
January 17, 2024Source

EU bets on quantum tech to boost its cybersecurity needs
The newly-launched Nostradamus project will test quantum key distribution (QKD) technology
January 17, 2024Source

Financial services businesses see spike in vendor email compromise
A new report from Abnormal Security shows that vendor email compromise (VEC) attacks against financial services organizations increased by 137 percent in 2023.
January 17, 2024Source

GitHub Rotates Credentials in Response to Vulnerability
GitHub rotates credentials and releases patches after being alerted of a vulnerability affecting GitHub.com and GitHub Enterprise Server.
January 17, 2024Source

Google fixes actively exploited Chrome zero-day (CVE-2024-0519)
In the new stable release of the Chrome browser, Google has fixed three security vulnerabilities affecting the V8 engine, including one zero-day (CVE-2024-0519) with an existing exploit.
January 17, 2024Source

Here’s How ChatGPT Maker OpenAI Plans to Deter Election Misinformation in 2024
ChatGPT maker OpenAI outlines a plan to prevent its tools from being used to spread election misinformation in 2024.
January 17, 2024Source

How a Novel Legal Maneuver Got a Hospital's Stolen Data Back
Healthcare Attorney and Bioethicist David Hoffman on Battle Against Cybercriminals
January 17, 2024Source or Source or Source or Source or Source

Industrial Defender collaborates with Dragos to enhance outcomes for OT operators
Industrial Defender announced a strategic technology partnership with Dragos.
January 17, 2024Source

Inside the Massive Naz.API Credential Stuffing List
It feels like not a week goes by without someone sending me yet another credential stuffing list. It's usually something to the effect of "hey, have you seen the Spotify breach", to which I politely reply with a link to my old No, Spotify Wasn't Hacked blog post (it's just the output of a small set of credentials successfully tested against their service), and we all move on.
January 17, 2024Source

iShutdown scripts can help detect iOS spyware on your iPhone
Security researchers found that infections with high-profile spyware Pegasus, Reign, and Predator could be discovered on compromised Apple mobile devices by checking Shutdown.log, a system log file that stores reboot events.
January 17, 2024Source

Kaspersky releases utility to detect iOS spyware infections
Kaspersky’s researchers have developed a lightweight method to detect indicators of infection from sophisticated iOS spyware such as NSO Group’s Pegasus, QuaDream’s Reign, and Intellexa’s Predator through analyzing a log file created on iOS devices.
January 17, 2024Source

Living Security Unify Power Insights identifies vulnerable members within an organization
Living Security announced Unify Power Insights, which combines intelligence across multiple identity management and security tools to pinpoint visibility into which members of the workforce are most vulnerable to phishing, account compromise, malware, data loss, and more.
January 17, 2024Source

Microsoft: Iranian APT Impersonating Prominent Journalist in Clever Spear-Phishing Attacks
Microsoft says an APT with links to Iran’s military intelligence is impersonating a prominent journalist in clever spear-phishing attacks
January 17, 2024Source

Microsoft: Iranian hackers target researchers with new MediaPl malware
Microsoft says that a group of Iranian-backed state hackers are targeting high-profile employees of research organizations and universities across Europe and the United States in spearphishing attacks pushing new backdoor malware.
January 17, 2024Source

NetScaler, Atlassian, VMware Disclose Critical Flaws
Citrix NetScaler ADC and Gateway Bugs Exploited in the Wild
January 17, 2024Source or Source or Source or Source

New tech addresses augmented reality's privacy problem
An emergency room doctor using augmented reality could save precious seconds by quickly checking a patient's vitals or records. But the doctor could also unintentionally pull information for someone else in the room, breaching privacy and health care laws.
January 17, 2024Source

New UEFI vulnerabilities send firmware devs industry wide scrambling
PixieFail is a huge deal for cloud and data centers. For the rest, less so.
January 17, 2024Source

OpenAI Combats Election Misinformation Amid Growing Concerns
ChatGPT Maker Wants to Deter Use of AI in Online Election Misinformation Campaigns
January 17, 2024Source or Source or Source or Source or Source

Oracle Patches 200 Vulnerabilities With January 2024 CPU
Oracle releases 389 new security patches to address 200 vulnerabilities as part of the first Critical Patch Update of 2024.
January 17, 2024Source

Over 90 percent of organizations set to increase data protection spending
The latest Data Protection Trends report from Veeam Software shows 92 percent of organizations will increase their 2024 data protection spend, to achieve cyber resilience amid continued threats of ransomware and cyber-attacks.
January 17, 2024Source

Samsung and Google Cloud Join Forces To Bring Generative AI to Samsung Galaxy S24 Series
Google’s Gemini Pro and Imagen 2 to deploy in producing new text, voice, and image features on the new Samsung Galaxy S24 series
January 17, 2024Source

Skyhigh Security’s AI-driven DLP Assistant prevents critical data loss
Skyhigh Security announced an AI-driven DLP Assistant as an advanced DLP capability within its Security Service Edge (SSE) portfolio.
January 17, 2024Source

Smart devices' ambient light sensors pose imaging privacy risk
In George Orwell's novel "1984," Big Brother watches citizens through two-way, TV-like telescreens to surveil citizens without any cameras. In a similar fashion, our current smart devices contain ambient light sensors, which open the door to a different threat: Hackers.
January 17, 2024Source

Swiss Govt Websites Hit by Pro-Russia Hackers After Zelensky Visit
Switzerland said that a cyberattack claimed by a pro-Russian group disrupted access to some government websites, following Ukrainian President Volodymyr Zelensky’s visit to Davos.
January 17, 2024Source

Universities not delivering the right skills for cybersecurity
Over three quarters of cybersecurity professionals in the UK and US don't believe university courses are preparing graduates adequately for the working world, according to new research.
January 17, 2024Source

US Gov Issues Warning for Androxgh0st Malware Attacks
A joint advisory from CISA and the FBI warns about Androxgh0st malware attacks ensnaring devices in a botnet.
January 17, 2024Source

Vicarius raises $30 million to accelerate the development of new AI capabilities
Vicarius announced a $30 million Series B led by cybersecurity investment firm Bright Pixel (formerly Sonae IM).
January 17, 2024Source

Vulnerability Management Firm Vicarius Raises $30 Million
New York based vulnerability management firm Vicarius has raised $30 million in a Series B funding round led by Bright Pixel.
January 17, 2024Source

What is a vCISO and why would you want to hire one? [Q&Aamp;A]
As the profile of cybersecurity has increased within enterprises, so has the challenge of finding people to fill senior roles and then hanging on to them.
January 17, 2024Source

Internet — Security Issues — January 16th, 2024

94 percent of organizations suffer email security incidents
According to a new study, 94 percent of global organizations have experienced email security incidents last year, up two percent from the year before.
January 16, 2024Source

1,700 Ivanti VPN devices compromised. Are yours among them?
Over 1,700 Ivanti Connect Secure VPN devices worldwide have been compromised by attackers exploiting two zero-days with no patches currently available.
January 16, 2024Source

180k Internet-Exposed SonicWall Firewalls Vulnerable to DoS Attacks, Possibly RCE
Two DoS vulnerabilities patched in 2022 and 2023 haunt nearly 180,000 internet-exposed SonicWall firewalls.
January 16, 2024Source

Academia warned to guard 'crown jewels' after British Library hack
While cyber-attacks on banks, utilities and media platforms may grab the most attention, the hacking of the British Library has led to warnings that academia has become an easy target.
January 16, 2024Source

Accenture and SandboxAQ offer protection against quantum-based decryption attacks
Accenture and SandboxAQ are partnering to deliver AI and quantum computing solutions to help organizations identify and remediate cybersecurity vulnerabilities.
January 16, 2024Source

Alarming Phemedrone Malware Lets Hackers Sneak Past Windows Defender, Patch ASAP
Windows has had some recent security issues, but Microsoft has gnerally been good about offering critical fixes. A problem comes when people don't actually apply those fixes to make their systems more secure.
January 16, 2024Source

Atlassian reveals critical Confluence RCE flaw, urges “immediate action” (CVE-2023-22527)
Atlassian has patched a critical vulnerability (CVE-2023-22527) in Confluence Data Center and Confluence Server that could lead to remote code execution.
January 16, 2024Source

Beyond Hacktivism: Akamai CTO on Shifting Threat Landscape
Robert Blumofe on DDoS Attacks, API Security, Zero Trust and FIDO2-MFA
January 16, 2024Source or Source or Source or Source or Source

Crypto-Seeking Drainer Scam-as-a-Service Operations Thrive
$295 Million in Digital Assets Lost Last Year to Wallet Drainers, Researchers Warn
January 16, 2024Source or Source or Source or Source or Source

FBI: Androxgh0st malware botnet steals AWS, Microsoft credentials
CISA and the FBI warned today that threat actors using Androxgh0st malware are building a botnet focused on cloud credential theft and using the stolen information to deliver additional malicious payloads.
January 16, 2024Source

Fortinet unveils networking solution integrated with Wi-Fi 7
Fortinet announced a comprehensive secure networking solution integrated with Wi-Fi 7.
January 16, 2024Source

Google Warns of Chrome Browser Zero-Day Being Exploited
The exploited zero-day, tagged as CVE-2024-0519, is described as an out-of-bounds memory access issue in the V8 JavaScript engine.
January 16, 2024Source

Government, Military Targeted as Widespread Exploitation of Ivanti Zero-Days Begins
The recently disclosed Ivanti VPN zero-days have been exploited to hack at least 1,700 devices, including government, telecoms, defense, and tech.
January 16, 2024Source

Hacker Conversations: HD Moore and the Line Between Black and White
SecurityWeek talked to HD Moore, best known as the founder and original developer of Metasploit.
January 16, 2024Source

Hackers begin mass-exploiting Ivanti VPN zero-day flaws
Malicious hackers have begun mass-exploiting two critical zero-day vulnerabilities in Ivanti’s widely used corporate VPN appliance.
January 16, 2024Source

Ho, Ho, Hoooold on a Minute: A New Year Resolution That IoT Isn’t a Gift That Keeps on Taking
Some IoT products may make your life easier, but they also may be somewhat of a Trojan Horse.
January 16, 2024Source

How to protect your organization from malicious macros - ITSAP.00.200
Macros are written sequences that automate processes, data flows, and repetitive tasks in applications, such as in some Microsoft Office Suite documents. These written sequences, sometimes referred to as embedded code, allows the user to create shortcuts for specific tasks like sorting worksheets alphabetically, unmerging all merged cells, or making all rows and columns visible.
January 16, 2024Source

Majorca city Calvià extorted for $11M in ransomware attack
The Calvià City Council in Majorca announced it was targeted by a ransomware attack on Saturday, which impacted municipal services.
January 16, 2024Source

Money Launderers, Fraudsters Flocking to Tether: UN Report
Cryptocurrency Has 'Supercharged' Organized Crime in Southeast Asia
January 16, 2024Source or Source or Source or Source or Source

NC Health System Agrees to Pay $6.6M in Web Tracking Case
Novant Health Is Among Latest Organizations Opting to Settle Patient Privacy Claims
January 16, 2024Source or Source or Source or Source or Source

NetScaler ADC and NetScaler Gateway vulnerabilities CVE-2023-6548 and CVE-2023-6549
Administrators of a Citrix NetScaler ADC or a Citrix NetScaler Gateway should take action. Manufacturer Citrix has published a security advisory regarding the two vulnerabilities CVE-2023-6548 and CVE-2023-6549 in the above-mentioned products on January 16, 2024. One vulnerability allows DDoS attacks, while the second vulnerability allows authenticated (low privileged) remote code execution on the management interface.
January 16, 2024Source

New collaboration helps organizations defend against AI and quantum risks
One of the key recent concerns for security teams has been developing the ability to adapt to advancements in technology and innovations such as AI and quantum computing.
January 16, 2024Source

New malware bypassing Windows SmartScreen is hungry for your data, and it wants it all
The researchers from Trend Micro have discovered a previously unknown strain of malware, dubbed Phemedrone Stealer, that is actively exploiting already patched Windows Defender SmartScreen vulnerability CVE-2023-36025, Security Week reports.
January 16, 2024Source

Optimizing MDR in Risk-Based Cybersecurity
Pondurance CEO Doug Howard on Getting the Most from MDR Providers
January 16, 2024Source

Regionally-Scoped Google’s Cloud Armor Security Policies
Google announced the general availability of regionally-scoped security policies for Google Cloud Armor, Google's premier DDoS defense and Web Application Firewall (WAF) solution.
January 16, 2024Source

Remotely Exploitable ‘PixieFail’ Flaws Found in Tianocore EDK II PXE Implementation
Quarkslab finds serious, remotely exploitable vulnerabilities in EDK II, the de-facto open source reference implementation of the UEFI spec.
January 16, 2024Source

Skopenow Grid detects the earliest signals of critical risks
Skopenow launched Grid, its new 360-degree situational awareness solution.
January 16, 2024Source

The Dual Role AI Plays in Cybersecurity: How to Stay Ahead
There's a wide range of AI-enabled solutions available for various business use cases, and organizations are increasingly recognizing their value. According to a survey, 33 percent of organizations are currently leveraging generative AI in at least one business function.
January 16, 2024Source

Thomvest Ventures closes $250M fund to invest across fintech, cybersecurity, AI
Thomvest Ventures is popping into 2024 with a new $250 million fund and the promotion of Umesh Padval and Nima Wedlake to the role of managing directors.
January 16, 2024Source

VMware Urges Customers to Patch Critical Aria Automation Vulnerability
Aria Automation is affected by a critical vulnerability that could be exploited to gain access to remote organizations and workflows.
January 16, 2024Source

Vulnerabilities Expose PAX Payment Terminals to Hacking
Vulnerabilities in Android-based PoS terminals from PAX can be exploited to downgrade bootloaders, execute arbitrary code.
January 16, 2024Source

White House Says Agencies on Track to Meet January AI Goals
Official Says Administration Taking 'Aggressive Set of Actions' to Meet Deadlines
January 16, 2024Source or Source or Source or Source or Source

Internet — Security Issues — January 15th, 2024

Busted: Cryptojacking; UndeadApes NFT Rug Pull Suspects
Ukraine Nabs Suspected Cryptojacker; US Air Force Cyber Analyst Accused of Rug Pull
January 15, 2024Source or Source or Source or Source or Source

Data brokers know everything about you—what the FTC case against ad tech giant Kochava reveals
Kochava, the self-proclaimed industry leader in mobile app data analytics, is locked in a legal battle with the Federal Trade Commission in a case that could lead to big changes in the global data marketplace and in Congress' approach to artificial intelligence and data privacy.
January 15, 2024Source

DOD Unveils First-Ever National Defense Industrial Strategy
Pentagon Warns Failure to Modernize Defense Industrial Base Will Hinder US Globally
January 15, 2024Source or Source or Source or Source or Source

Exclusive: Cloud Vendor Returns Stolen Hospital Data
Alliance Had Sued LockBit Gang to Force Cloud Firm to Release Affected Patient Data
January 15, 2024Source or Source or Source or Source or Source

Generative AI Concerns Grow in Record Election Year
Davos Forum Highlights Worries About AI-Enabled Misinformation
January 15, 2024Source or Source or Source or Source or Source

GitLab Patches Critical Password Reset Vulnerability
GitLab has resolved a critical authentication vulnerability allowing attackers to hijack password reset emails.
January 15, 2024Source

Hacker Behind $2 Million Cryptocurrency Mining Scheme Arrested in Ukraine
Ukrainian authorities have arrested an individual allegedly involved in a $2 million cryptojacking operation.
January 15, 2024Source

Honeytokens for Peace of Mind: Using Cyber Deception To Buy Time to Remediate at Scale
Honeytokens bring peace of mind that you are safe from leaks and attacks while tackling secrets sprawl, no matter how many repos or developers you have.
January 15, 2024Source

Information Stealer Exploits Windows SmartScreen Bypass
Attackers exploit a recent Windows SmartScreen bypass vulnerability to deploy the Phemedrone information stealer.
January 15, 2024Source

Juniper fixes critical RCE in its SRX firewalls and EX switches (CVE-2024-21591)
Juniper Networks has fixed a critical pre-authentication remote code execution (RCE) vulnerability (CVE-2024-21591) in Junos OS on SRX firewalls and EX switches.
January 15, 2024Source

Juniper Networks Patches Critical Remote Code Execution Flaw in Firewalls, Switches
Juniper Networks patches over 100 vulnerabilities, including a critical flaw that can be exploited for remote code execution against firewalls and switches.
January 15, 2024Source

Mississippi Health System Ransomware Attack Affects 253,000
Report to State Regulators Indicates Big Jump in Number of Patients Affected
January 15, 2024Source or Source or Source or Source or Source

Researchers Spot Critical Security Flaw in Bosch Thermostats
Bitdefender Finds Vulnerability in Popular IoT Device
January 15, 2024Source or Source or Source or Source or Source

Taylor Swift, Selena Gomez deepfakes used in Le Creuset giveaway scam
Scammers continue to use celebrities' likeness to shill phony products.
January 15, 2024Source

Trellix XDR Platform for RDR strengthens operational resilience
Trellix announced Trellix XDR Platform for Ransomware Detection and Response (RDR), available immediately worldwide.
January 15, 2024Source

US court docs expose fake antivirus renewal phishing tactics
In a seizure warrant application, the U.S. Secret Service sheds light on how threat actors stole $34,000 using fake antivirus renewal subscription emails.
January 15, 2024Source

What Is Compliance Monitoring for Remote Developers?
Compliance monitoring helps ensure remote developers follow the rules and regulations set forth by companies and the industry. Here are a few monitoring measures.
January 15, 2024Source

Windows SmartScreen bug exploited to deliver powerful info-stealer (CVE-2023-36025)
A vulnerability (CVE-2023-36025) that Microsoft fixed in November 2023 continues to be exploited by malware peddlers: this time around, the delivered threat is a variant of the Phemedrone Stealer.
January 15, 2024Source

Windows SmartScreen flaw exploited to drop Phemedrone malware
A Phemedrone information-stealing malware campaign exploits a Microsoft Defender SmartScreen vulnerability (CVE-2023-36025) to bypass Windows security prompts when opening URL files.
January 15, 2024Source

Internet — Security Issues — January 13th, 2024

Adding OpenSSL Generated Certificates to Your Server: A Comprehensive Guide
This article covers, the process of adding OpenSSL-generated certificates to your server along with the key ideas and procedures you need to follow to make sure your server is secure.
January 13, 2024Source

Chinese Nation-State Hacker Is Exploiting Cisco Routers
'Volt Typhoon' Could Be Preparing for Renewed Burst of Activity
January 13, 2024Source or Source or Source or Source

Internet — Secuirty Issues — Miscellaneous

Adaptive Research & Design Co.
data recovery from crashes, viruses, electrical surges, and sabotage, on hard and floppy drives under any operating system.
Provides a ServiceSource

Anti-Phishing Working Group
Committed to wiping out Internet scams and fruad.
An ArticleSource

Catapult Integrated Systems
is a premier systems integrator and commercial managed Internet services provider serving northern California since 1992.
Provides a ServiceSource

Data Security
Seclore is an information rights management company which helps to protect documents and information by preserving enterprise rights management.
Provides a ServiceSource

European Institute for Computer Anti-Virus Research (EICAR)
leads task forces, organizes conferences, and publishes documents.
Provides InformationSource

Leprechaun Software
develops VirusBUSTER, an anti-virus software that protects PCs from boot, program, macro, and email based viruses.
Provides InformationSource

Packet Analytics
Net/FSE, Packet Analytics' network data search engine, puts the power of real time searches over terabytes of NetFlow data in the hands of security analysts. Employing sophisticated algorithms, Net/FSE reduces exposure to significant business risk by enabling security specialists to quickly and determine the extent of a network alert.
Provides a ServiceSource

PhishTank
Out of the Net, into the Tank.
Provides a ServiceSource

Remove Windows Script Hosting
completely from your system.
Provides InformationSource

SecureList
Kaspersky Lab presents Lab Matters, a series of webcasts that get right to the heart of some of the IT security industry's hottest topics. in the first program, two of the company's leading antimalware experts, Costin Raiu and Magnus Kalkuhl, will be giving viewers the complete lowdown on targeted attacks and discussing a host of other fascinating topics.
Provides InformationSource

Stiller Research
We provide current anti-virus news, a list of myths regarding viruses, a virus information list and a list of in-the-wild viruses.
Provides InformationSource

Symantec Security Updates
library of documents on computer viruses including the top ten list of most common viruses and new viruses to be on the alert for, as well as general virus Q&Amp;A.
Provides InformationSource

Virus Alert
for GOOD TIMES, read about these fake viruses.
Provides InformationSource

VirusTotal
VirusTotal is a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines.
Provides a ServiceSource

The MerchantStore © 1997 — 2024