The MerchantStore

DirectoryAbout UsAdd-siteLink to Us

 

1,000 Internet — Security Issues Entries

Internet — Security Issues — April 12th, 2024

5 Ways Your Personal Information May End Up On The Dark Web
As technology advances, cybersecurity has never been more important. Each new device we connect to the internet further opens the door for cyberattacks and leaks of our personal information onto the dark web. But what is this part of the internet? 
April 12th, 2024Source

A Vulnerability in PAN-OS Could Allow for Arbitrary Code Execution
A vulnerability has been discovered in PAN-OS that could allow for arbitrary code execution. PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the root user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
April 12th, 2024Source

American Privacy Rights Bill: Implications for Health Sector
How Proposed Data Privacy Law Could Affect the Handling of Health Information
April 12th, 2024Source or Source or Source or Source or Source

API startup Noname Security nears $500M deal to sell itself to Akamai
Noname Security, a cybersecurity startup that protects APIs, is in advanced talks with Akamai Technologies to sell itself for $500 million, according to a person familiar with the deal.
April 12th, 2024Source

‘BatBadBut’ Command Injection Vulnerability Affects Multiple Programming Languages
A critical vulnerability in multiple programming languages allows attackers to inject commands in Windows applications.
April 12th, 2024Source

Cado Security teams up with Wiz to accelerate forensic investigations and minimize cloud threats
Cado Security has uveiled its partnership with Wiz and joins Wiz Integration (WIN) Platform. Cado Security enhances WIN by bringing the power of the Cado Security platform to the partner ecosystem so that Wiz customers can seamlessly integrate Cado into their existing cloud security workflows.
April 12th, 2024Source

Check Point boosts security in Harmony Email & Collaboration
Check Point announced new email security features that enhance its Check Point Harmony Email & Collaboration portfolio: Patented unified quarantine, DMARC monitoring, archiving, and Smart Banners.
April 12th, 2024Source

Cloned Voice Tech Is Coming for Bank Accounts
Experts Warn AI Tools Can Now Compromise Voice Password Systems Used by Many Banks
April 12th, 2024Source or Source or Source or Source or Source or Source

Critical EUV chipmaking tool supplier hacked, pressed to pay $10 million for ransomware unlock – Hoya dismisses hack as an ‘IT system incident’
1.7 million files were swiped by Hunters International, say reports.
April 12th, 2024Source

CVE-2024-3400 exploited: Unit 42, Volexity share more details about the attacks
Earlier today, Palo Alto Networks revealed that a critical command injection vulnerability (CVE-2024-3400) in the company’s firewalls has been exploited in limited attacks and has urged customers with vulnerable devices to quickly implement mitigations and workarounds.
April 12th, 2024Source

Epic wants to blow the Google Play Store wide open
The company isn't holding back in its demands after winning an antitrust case against Google.
April 12th, 2024Source

Exploitation of Unpatched D-Link NAS Device Vulnerabilities Soars
Second identifier, CVE-2024-3272, assigned to unpatched D-Link NAS device vulnerabilities, just as exploitation attempts soar.
April 12th, 2024Source

FBI Calls for Increased Funding to Counter Cyber Threats
FBI Director Chris Wray Warns U.S. Falling Behind to Adversaries in Cyberspace
April 12th, 2024Source or Source or Source or Source or Source

“Highly capable” hackers root corporate networks by exploiting firewall 0-day
No patch yet for unauthenticated code-execution bug in Palo Alto Networks firewall.
April 12th, 2024Source

House Will Try Again on Reauthorization of US Spy Program After Republican Upheaval
Speaker Mike Johnson is expected to bring forward a Plan B that would reform and extend Section 702 of the Foreign Intelligence Surveillance Act for a shortened period of two years.
April 12th, 2024Source

How Ukraine’s cyber police fights back against Russia’s hackers
Ukraine's cyber police talks crypto, ransomware and documenting war crimes after Russia's invasion
April 12th, 2024Source

In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns
Noteworthy stories that might have slipped under the radar: Moscow sewage system hacked, a new women in cybersecurity report, PasteHub domain seized by law enforcement.
April 12th, 2024Source

ISMG Editors: Unpacking the Change Healthcare Attack Saga
Also: Positive Cyber Market Trends, AI Threats to Supply Chain Security
April 12th, 2024Source

or Source or Source or Source or Source

LastPass Employee Targeted With Deepfake Calls
LastPass this week revealed that one of its employees was targeted in a phishing attack involving deepfake technology.
April 12th, 2024Source

Microsoft breach allowed Russian spies to steal emails from US government
Affected federal agencies must comb through mails, reset API keys and passwords
April 12th, 2024Source

Palo Alto Networks enhances Cortex XSIAM to help SecOps teams identify cloud threats
Palo Alto Networks announced a new milestone in how security operations centers (SOC) secure the cloud.
April 12th, 2024Source

Palo Alto Networks firewalls under attack, hotfixes incoming! (CVE-2024-3400)
Attackers are exploiting a command injection vulnerability (CVE-2024-3400) affecting Palo Alto Networks’ firewalls, the company has warned, and urged customers to implement temporary mitigations and get in touch to check whether their devices have been compromised.
April 12th, 2024Source

Palo Alto Networks Warns of Exploited Firewall Vulnerability
Palo Alto Networks warns of limited exploitation of a critical command injection vulnerability leading to code execution on firewalls.
April 12th, 2024Source

PE Firm Accuses Synopsys of Breaching Exclusivity Agreement
Sunstone Partners: We Had a Letter of Intent to Buy Synopsys' Security Testing Unit
April 12th, 2024Source or Source or Source

Ransomware roundup: Possible Change Healthcare double extortion, LockBit reorganizes and more
And in other news, CISA directs federal agencies on Microsoft breach by Russian operatives.
April 12th, 2024Source

Raspberry Robin Morphs, Now Spreads via Windows Script Files
Malware Platform Operators Taket Steps to Obfuscate Code
April 12th, 2024Source or Source or Source or Source or Source

Roku hit with second major breach of 2024, this time affecting 576,000 users
This is the second credential stuffing incident since March.
April 12th, 2024Source

Roku says 576,000 user accounts hacked after second security incident
Streaming giant Roku has confirmed a second security incident in as many months, with hackers this time able to compromise more than half a million Roku user accounts.
April 12th, 2024Source or Source

Security engineer jailed for 3 years for $12M crypto hacks
Shakeeb Ahmed, a cybersecurity engineer convicted of stealing around $12 million in crypto, was sentenced on Friday to three years in prison.
April 12th, 2024Source

Sisense's data breach is serious enough that CISA is investigating. Here's what you need to do
A major breach left Sisense customer credentials open to hackers.
April 12th, 2024Source

Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted By Attackers
Research has found that criminals can demand higher ransom when they compromise an organisation’s backup data in a ransomware attack. Discover advice from security experts on how to properly protect your backup.
April 12th, 2024Source

State-Sponsored Hackers Exploit Zero-Day to Backdoor Palo Alto Networks Firewalls
A state-sponsored threat actor has been exploiting a zero-day in Palo Alto Networks firewalls for the past two weeks.
April 12th, 2024Source

The US government confirms Russian hacker attack on Microsoft stole government emails
In January 2024, Microsoft issued an alert stating that a hacker group believed to be state sponsored by Russia managed to access the email accounts of its top executives. This week, the US government revealed that that some of the emails between government agencies and Microsoft were taken by the group as part of this attack.
April 12th, 2024Source

Threat Actors Manipulate GitHub Search to Deliver Malware
Checkmarx warns of a new attack relying on GitHub search manipulation to deliver malicious code.
April 12th, 2024Source

US Cyber Command Expanded 'Hunt Forward' Operations in 2023
US Cyber Mission Force Led 22 Defensive Cyber Operations in 2023, Commander Says
April 12th, 2024Source or Source or Source or Source or Source

US think tank Heritage Foundation hit by cyberattack
Conservative think tank The Heritage Foundation said on Friday that it experienced a cyberattack earlier this week.
April 12th, 2024Source

Wiz Acquires Gem Security, Pushes Security Tools Consolidation
Financial terms of the translation were not disclosed but reports out of Tel Aviv valued the deal in the range of $350 million.
April 12th, 2024Source

Zscaler extends zero trust SASE and eliminates the need for firewall-based segmentation
Zscaler has signed an agreement to acquire Airgap Networks. Combining Zscaler’s zero trust SD-WAN and Airgap Networks’ agentless segmentation technology will transform how enterprises implement zero trust segmentation to IoT/OT devices, and critical infrastructure across branches, campuses, factories, and data centers, including east-west connectivity.
April 12th, 2024Source

Internet — Security Issues — April 11th, 2024

Alethea Raises $20 Million for Disinformation Detection and Mitigation Solution
Alethea has raised $20 million in Series B funding for its technology designed to detect and mitigate disinformation.
April 11th, 2024Source

Apple drops term 'state-sponsored' attacks from its threat notification policy
Apple has warned its users in India and 91 other countries that they were possible victims of a "mercenary spyware attack," ditching the phrase "state-sponsored" it used in its previous alerts to refer to such malware attacks.
April 11th, 2024Source

AppViewX CERT+ helps organizations identify and renew certificates before they expire
AppViewX announced new functionality in the AppViewX CERT+ certificate lifecycle management automation product that helps organizations prepare for Google's proposed 90-day TLS certificate validity policy.
April 11th, 2024Source

Breach Roundup: Sisense Supply Chain Attack
Also: A Romanian Botnet and Alcohol Counselor Monument Settles With US FTC Over Ads
April 11th, 2024Source or Source or Source or Source or Source

Change Healthcare Attack 'Devastating' to Doc Practices
AMA Survey Finds 80% of Practices Lost Revenue From Unpaid Claims
April 11th, 2024Source or Source or Source or Source

CISA says Sisense hack impacts critical infrastructure orgs
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is investigating the recent breach of data analytics company Sisense, an incident that also impacted critical infrastructure organizations.
April 11th, 2024Source

CISA warns about Sisense data breach
Business intelligence / data analytics software vendor Sisense has apparently suffered a data breach that spurred the company and the US Cybersecurity and Infrastructure Security Agency to push the company's customers to "reset credentials and secrets potentially exposed to, or used to access, Sisense services."
April 11th, 2024Source

CISA Warns Russian Microsoft Hackers Targeted Federal Emails
US Cyber Defense Agency Instructs Agencies to Fortify Systems Amid Microsoft Breach
April 11th, 2024Source or Source or Source or Source

Conservative Revolt in the House Blocks Effort to Reauthorize a Key US Spy Tool
A bill that would reauthorize Section 702 of the Foreign Intelligence Surveillance Act was blocked by a conservative revolt.
April 11th, 2024Source

Cryptohack Roundup: Google Sues Alleged Crypto App Crooks
Also: Terraform Labs Liable in US Court for Civil Fraud
April 11th, 2024Source or Source or Source or Source or Source

Data Access Platform PVML Launches With $8 Million in Funding
Tel Aviv startup banks seed funding for technology to help organizations connect, secure, and provide access to multiple data sources.
April 11th, 2024Source

Devious 'man in the middle' hacks on the rise: How to stay safe
A few precautions go a long way.
April 11th, 2024Source

Digimarc and DataTrails join forces to provide proof of digital content authenticity
Digimarc and DataTrails have partnered to deliver a fully integrated content protection solution to fortify digital content using advanced digital watermarks in tandem with cryptographic proofs, or fingerprints.
April 11th, 2024Source

Google Cloud Unveils New AI-Powered Security Capabilities
Google adds AI to cloud security features and announces other security capabilities for cloud customers.
April 11th, 2024Source

Google Pays Out $41,000 for Three Serious Chrome Vulnerabilities
Google releases a Chrome 123 update to resolve three high-severity memory safety vulnerabilities.
April 11th, 2024Source

Half of UK Firms, Charities Failed to Report Cyber Incidents
Survey: SMBs, Charities Mostly Targeted With Phishing, Online Impersonation in 2023
April 11th, 2024Source or Source or Source or Source or Source

Identity Security and How to Reduce Risk During M&A
SailPoint's Lori Diesen on Transitioning to SaaS-Based Identity Security
April 11th, 2024Source or Source

IMF: Financial Firms Lost $12 Billion to Cyberattacks in Two Decades
The financial sector has suffered over 20,000 cyberattacks in two decades, causing more than $12 billion in losses.
April 11th, 2024Source

Inside AWS's Crusade Against IP Spoofing and DDoS Attacks
SecurityWeek speaks to Tom Scholl, VP and distinguished engineer at AWS, on how the organization tackles IP Spoofing and DDoS attacks.
April 11th, 2024Source

Ivanti empowers IT and security teams with new solutions and enhancements
Ivanti released Ivanti Neurons for External Attack Surface management (EASM), which helps combat attack surface expansion with full visibility of external-facing assets and actionable intelligence on exposures.
April 11th, 2024Source

Knostic Emerges From Stealth With Enterprise Gen-AI Access Controls
Startup Knostic emerges from stealth mode with $3.3 million in funding and a gen-AI access control product for enterprises.
April 11th, 2024Source

Large businesses struggle to tackle cyber threats
Large businesses are finding it significantly more difficult to manage their cybersecurity than their smaller counterparts, according to new research from passwordless authentication company IDEE.
April 11th, 2024Source

LastPass: Hackers targeted employee in failed deepfake CEO call
LastPass revealed this week that threat actors targeted one of its employees in a voice phishing attack, using deepfake audio to impersonate Karim Toubba, the company's Chief Executive Officer.
April 11th, 2024Source

New Malwarebytes tool lets you see where your data is exposed
With so many data breaches having taken place it's almost inevitable that at least some of your personal information has been exposed online. But finding out exactly what can be tricky.
April 11th, 2024Source

Optics giant Hoya hit with $10 million ransomware demand
A recent cyberattack on Hoya Corporation was conducted by the 'Hunters International' ransomware operation, which demanded a $10 million ransom for a file decryptor and not to release files stolen during the attack.
April 11th, 2024Source

Palo Alto Networks Patches Vulnerabilities Allowing Firewall Disruption
Palo Alto Networks patches several high-severity vulnerabilities, including ones that allow DoS attacks against its firewalls.
April 11th, 2024Source

PVML raises $8 million to offer protection for enterprise data
PVML unveils its platform for secure AI-powered data access and $8 million in Seed funding led by NFX with participation from FJ Labs and Gefen Capital.
April 11th, 2024Source

Ransomware group maturity should influence ransom payment decision
Your organization has been hit by ransomware and a decision has to be made on whether or not to make the ransom payment to get your data decrypted, deleted from attackers' servers, and/or not leaked online.
April 11th, 2024Source

Simbian Emerges From Stealth With $10 Million to Build Autonomous AI-Based Security Platform
Simbian aims to build a fully autonomous security platform that lets humans make the strategic decisions while AI implements those decisions.
April 11th, 2024Source

Sisense Data Breach Triggers CISA Alert and Urgent Calls for Credential Resets
The US government issues a red-alert for what appears to be a massive supply chain breach at Sisense, a company that sells big-data analytics tools.
April 11th, 2024Source

US Cyber Force Assisted Foreign Governments 22 Times in 2023
USCYBERCOM's Cyber National Mission Force participated in 22 foreign hunt forward operations in 2023.
April 11th, 2024Source

US Government on High Alert as Russian Hackers Steal Critical Correspondence From Microsoft
The US government says Midnight Blizzard's compromise of Microsoft corporate email accounts "presents a grave and unacceptable risk to federal agencies."
April 11th, 2024Source

US government urges Sisense customers to reset credentials after hack
U.S. cybersecurity agency CISA is warning Sisense customers to reset their credentials and secrets after the data analytics company reported a security incident.
April 11th, 2024Source

US says Russian hackers stole federal government emails during Microsoft cyberattack
U.S. Cybersecurity and Infrastructure Security Agency (CISA) has confirmed that Russian government-backed hackers stole emails from several U.S. federal agencies as a result of an ongoing cyberattack at Microsoft.
April 11th, 2024Source

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program
With automated, detailed, contextualized threat intelligence, organizations can better anticipate malicious activity and utilize intelligence to speed detection around proven attacks.
April 11th, 2024Source

Will AI be listening in on your future job interview? On law, technology and privacy
The law and Artificial Intelligence (AI) applications need to be better aligned to ensure our personal data and privacy are protected. Ph.D. candidate Andreas Häuselmann can see opportunities with AI, but dangers if this does not happen.
April 11th, 2024Source

Wiz Buys Startup Gem Security for $350M to Spot Cloud Issues
Buying CDR Startup Gem Will Help Wiz Address Needs of SecOps, Incident Responders
April 11th, 2024Source or Source or Source

Zscaler Buys Airgap Networks to Fuel Segmentation in IoT, OT
Deal Will Thwart Lateral Movement of Malicious Traffic Inside of Corporate Networks
April 11th, 2024Source or Source or Source or Source or Source or Source

Internet — Security Issues — April 10th, 2024

530k Impacted by Data Breach at Wisconsin Healthcare Organization
The personal information of 500,000 people was compromised in a data breach at Group Health Cooperative of South Central Wisconsin.
April 10th, 2024Source

AT&T Data Breach Update: 51 Million Customers Impacted
The recent AT&T data breach impacts 51 million customers, the company tells Maine's attorney general.
April 10th, 2024Source

CISA Releases Malware Next-Gen Analysis System for Public Use
CISA's Malware Next-Gen system is now available for any organization to submit malware samples and other suspicious artifacts for analysis.
April 10th, 2024Source

Cloud Computing - Gain Network-Level Control From Anywhere
Why Moving to the Cloud Is a Strategic Gain for Federal Agencies
April 10th, 2024Source or Source or Source

Cohesity teams up with Intel to integrate confidential computing into Data Cloud Services
Cohesity has announced it is collaborating with Intel to bring Intel's confidential computing capabilities to the Cohesity Data Cloud. Leveraged with Fort Knox, Cohesity's cyber vault service, this data-in-use encryption innovation will be the first of its kind in the data management industry.
April 10th, 2024Source

Script to Load Info Stealer
Proofpoint Spots Novel Threat Against German Organizations
April 10th, 2024Source or Source or Source or Source or Source

Cyera Gets $300M at $1.4B Valuation to Fuel Safe AI Adoption
Series C Funding Round Aims to Transform Data Protection, Empower Safe Use of AI
April 10th, 2024Source or Source or Source

Eclypsium Automata discovers vulnerabilities in IT infrastructure
Eclypsium launches Automata, a new AI-assisted feature for its digital supply chain security platform.
April 10th, 2024Source

Fortinet Patches Critical RCE Vulnerability in FortiClientLinux
Fortinet has released patches for a dozen vulnerabilities, including a critical-severity remote code execution flaw in FortiClientLinux.
April 10th, 2024Source

Index Engines CyberSense 8.6 detects malicious activity
Index Engines announced the latest release of its CyberSense software, with version 8.6 delivering a revamped user interface to support smarter recovery from ransomware attacks, new custom Advanced Threshold Alerts to proactively detect unusual activity, and AI-powered detection of ransomware-based data corruption to accelerate recovery and minimize business disruption.
April 10th, 2024Source

IT pros targeted with malicious Google ads for PuTTY, FileZilla
An ongoing malvertising campaign is targeting IT administrators looking to download system utilities such as PuTTY (a free SSH and Telnet client) and FileZilla (a free cross-platform FTP application).
April 10th, 2024Source

Malicious Visual Studio projects on GitHub push Keyzetsu malware
Threat actors are abusing GitHub automation features and malicious Visual Studio projects to push a new variant of the "Keyzetsu" clipboard-hijacking malware and steal cryptocurrency payments.
April 10th, 2024Source

Microsoft Patches Two Zero-Days Exploited for Malware Delivery
Microsoft patches CVE-2024-29988 and CVE-2024-26234, two zero-day vulnerabilities exploited by threat actors to deliver malware.
April 10th, 2024Source

Nearly 534,000 Affected in Data Theft at Managed Care Org
Wisconsin Nonprofit Says Attackers Also Tried to Encrypt Systems, But They Failed
April 10th, 2024Source or Source or Source or Source or Source

New covert SharePoint data exfiltration techniques revealed
Varonis Threat Labs researchers have uncovered two techniques attackers can use can use for covert data and file exfiltration from companies' SharePoint server.
April 10th, 2024Source

Russia Tops Global Cybercrime Index, New Study Reveals
Russia, Ukraine, China and US All Top 'First-Ever World Cybercrime Index'
April 10th, 2024Source or Source or Source or Source or Source

Should We Just Accept the Lies We Get From AI Chatbots?
NYC's New Chatbot, Hallucinating LLMs Just Can't Be Fixed, Says Linguistics Expert
April 10th, 2024Source or Source or Source or Source or Source

Silent Surge: The Sudden Rise in Synthetic Business Fraud
Experts Say Fraud Related to Fake Businesses Has Grown 150% in the Past Year
April 10th, 2024Source or Source or Source

Sprinto Raises $20 Million for Automated Risk and Compliance Platform
Risk and compliance solutions provider Sprinto has raised $20 million in a Series B funding round led by Accel.
April 10th, 2024Source

The real battle for data privacy begins when you die
In 2012 a 15-year-old girl died in Berlin after being hit by a subway train. Her bereaved parents asked Facebook to turn over her private messages in hopes of understanding whether her death was a suicide or an accident.
April 10th, 2024Source

Thousands of LG TVs Possibly Exposed to Remote Hacking
Many LG TVs may be vulnerable to remote hacking due to a series of vulnerabilities found by Bitdefender researchers.
April 10th, 2024Source

US Bipartisan Privacy Bill Contains Cybersecurity Mandates
American Privacy Rights Act Has Genuine Chance of Becoming Law
April 10th, 2024Source

US CISA Aims to Expand Automated Malware Analysis Support
US Cyber Defense Agency Scales Next-Generation Malware Analysis Platform
April 10th, 2024Source or Source or Source or Source

Vultr Sovereign Cloud and Private Cloud delivers data control to nations and enterprises
Vultr launched Vultr Sovereign Cloud and Private Cloud in response to the increased importance of data sovereignty and the growing volumes of enterprise data being generated, stored and processed in even more locations — from the public cloud to edge networks and IoT devices, to generative AI.
April 10th, 2024Source

Wiz Buys Startup Gem Security for $350M to Spot Cloud Issues
Buying CDR Startup Gem Will Help Wiz Address Needs of SecOps, Incident Responders
April 10th, 2024Source or Source

World-first 'Cybercrime Index' ranks countries by cybercrime threat level
Following three years of intensive research, an international team of researchers have compiled the first ever "World Cybercrime Index," which identifies the globe's key cybercrime hotspots by ranking the most significant sources of cybercrime at a national level.
April 10th, 2024Source

Internet — Security Issues — April 6th, 2024

House to Take up Bill to Reauthorize Crucial US Spy Program as Expiration Date Looms
Section 702 of the Foreign Intelligence Surveillance Act expires on April 19.
April 6th, 2024Source

Price of zero-day exploits rises as companies harden products against hackers
A startup is now offering millions of dollars for tools to hack iPhones, Android devices, WhatsApp, and iMessage
April 6th, 2024Source

US Health Dept warns hospitals of hackers targeting IT help desks
The U.S. Department of Health and Human Services (HHS) warns that hackers are now using social engineering tactics to target IT help desks across the Healthcare and Public Health (HPH) sector.
April 6th, 2024Source

Internet — Security Issues — April 5th, 2024

3 healthcare organizations that are building cyber resilience
From 2018 to 2023, healthcare data breaches have increased by 93 percent. And ransomware attacks have grown by 278 percent (PDF) over the same period. Healthcare organizations can't afford to let preventable breaches slip by. Globally, the average cost of a healthcare data breach has reached $10.93 million.
April 5th, 2024Source

5 ways to strengthen healthcare cybersecurity
Ransomware attacks are targeting healthcare organizations more frequently. The number of costly or cyberattacks on US hospitals has doubled

. So how do you prevent these attacks? Keep reading to learn five ways you can strengthen security at your organization. But first, let's find out what's at stake.
April 5th, 2024Source

A Vulnerability in Broadcom Brocade Fabric OS Could Allow for Arbitrary Code Execution
A vulnerability has been discovered in Broadcom Brocade Fabric OS that could allow for arbitrary code execution. Broadcom Brocade Fabric OS is the storage area networking firmware for Brocade Communications Systems' Fibre Channel switch and Fibre Channel directors. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the logged-on user or obtain root level privileges.
April 5th, 2024Source

Acuity confirms hackers stole non-sensitive govt data from GitHub repos
Acuity, a federal contractor that works with U.S. government agencies, has confirmed that hackers breached its GitHub repositories and stole documents containing old and non-sensitive data.
April 5th, 2024Source

Acuity Responds to US Government Data Theft Claims, Says Hackers Obtained Non-Sensitive Info
Acuity, the tech firm from which hackers claimed to have stolen State Department and other government data, confirms hack, but says stolen info is old.
April 5th, 2024Source

Almost a quarter of consumers consider cybersecurity when choosing a bank
What factors do you take into account when choosing a bank? How good the interest they offer on your savings is perhaps? Whether there's a convenient branch nearby? How easy the website is to navigate? A new study shows that 23 percent of US and UK consumers say that a bank's approach to cybersecurity is a factor when they consider opening an account.
April 5th, 2024Source

Cisco Warns of Vulnerability in Discontinued Small Business Routers
Cisco says it will not release patches for a cross-site scripting vulnerability impacting end-of-life small business routers.
April 5th, 2024Source

Cloudflare Enters Observability Space With Baselime Purchase
Acquiring Baselime Will Give Developers Better Visibility Into Serverless Platforms
April 5th, 2024Source or Source or Source or Source

Cybersecurity Firms Raised $2.3 Billion in Q1 2024: Report
Cybersecurity companies raised $2.3 billion in funding in Q1 2024, a 20% decrease compared to the same period of 2023, according to Pinpoint.
April 5th, 2024Source

Different Types Of Cyberattacks And How To Best Protect Yourself From Them
An estimated 800,000 people are hacked each year — and you could be one of them. Cybercriminals are increasingly growing their attack surface, thanks to explosive growth in cloud and mobile technologies, the Internet of Things, and artificial intelligence. With a cyber attack occurring every 39 seconds, it's essential to know how they occur and how you can avoid becoming a criminal's next victim.
April 5th, 2024Source

Filipino Hacktivists Destroy Technology Agency Servers
Attackers Dismantle Department's Server Infrastructure, Delete Up to 25TB of Data
April 5th, 2024Source

Hackers Can Use AI Hallucinations to Spread Malware
A Fake Software Library Made Up by a ChatBot Was Downloaded More Than 35,000 Times
April 5th, 2024Source or Source or Source or Source or Source

In Other News: 100,000 Affected by CISA Breach, Microsoft AI Copilot Ban, Nuclear Site Prosecution
Noteworthy stories that might have slipped under the radar: the CISA hack could impact 100,000 people, Microsoft AI Copilot banned by US House, UK nuclear site prosecution.
April 5th, 2024Source

ISMG Editors: Breaking Down OT Cybersecurity Challenges
Also: Implications of a Critical Linux Utility Backdoor; Focus on Cloud Security
April 5th, 2024Source or Source or Source or Source or Source

Ivanti CEO pledges to "fundamentally transform" its hard-hit security model
Part of the reset involves AI-powered documentation search and call routing.
April 5th, 2024Source

Lens Maker Hoya Scrambling to Restore Systems Following Cyberattack
Japanese lens maker Hoya says production processes and ordering systems were disrupted by a cyberattack.
April 5th, 2024Source

Magento Vulnerability Exploited to Deploy Persistent Backdoor
Attackers are exploiting a recent Magento vulnerability to deploy a persistent backdoor on ecommerce websites.
April 5th, 2024Source

Medical Device Cyberthreat Modeling: Top Considerations
Threat Modeling Expert Adam Shostack on Critical Mistakes to Avoid
April 5th, 2024Source or Source or Source or Source or Source

Microsoft says China-based hackers are using AI-assisted efforts to sow division in the US
Microsoft has had its own issues with China-based hackers that have accessed information from government email accounts that used Outlook. However, the company's Microsoft Threat Analysis Center (MTAC) has also been monitoring actors based in China that have been using social networks to post false information to US citizens.
April 5th, 2024Source

NIST Grants $3.6 Million to Boost US Cybersecurity Workforce
NIST announced $3.6 million in grants for 18 education and community organizations to build the future cybersecurity workforce.
April 5th, 2024Source

Panera Bread week-long IT outage caused by ransomware attack
Panera Bread's recent week-long outage was caused by a ransomware attack, according to people familiar with the matter and emails seen by BleepingComputer.
April 5th, 2024Source

Phishing Attacks Targeting Political Parties, Germany Warns
Escalation of Cyberespionage Likely Tied to Upcoming European Elections
April 5th, 2024Source or Source or Source or Source

Sanction the use of cyberweapons, not the weapons themselves, concludes expert review
A recent analysis by Helene Pleil, research associate at the Digital Society Institute (DSI) at ESMT Berlin, alongside colleagues from Technical University Darmstadt, outlines that rapid technological progress, a lack of political will and uniform definitions, as well as the dual use of cyber tools, are the main challenges facing effective cyber arms control which is vital for foreign and security policy.
April 5th, 2024Source

Sophisticated Latrodectus Malware Linked to 2017 Strain
New Malware With Ties to IcedID Loader Evades Detection, Gains Persistence
April 5th, 2024Source or Source or Source or Source or Source

The Antisocial Network Review
A funny, disturbing documentary about the modern internet
April 5th, 2024Source

The Week in Ransomware - April 5th 2024 - Virtual Machines under Attack
Ransomware attacks targeting VMware ESXi and other virtual machine platforms are wreaking havoc among the enterprise, causing widespread disruption and loss of services.
April 5th, 2024Source

This backdoor almost infected Linux everywhere: The XZ Utils close call
For the first time, an open-source maintainer put malware into a key Linux utility. We're still not sure who or why - but here's what you can do about it.
April 5th, 2024Source

Trellix ZTS enables organizations to strengthen cyber resilience
Trellix announced the Trellix Zero Trust Strategy (ZTS) Solution, available immediately worldwide.
April 5th, 2024Source

Vietnamese Threat Actor Targeting Financial Data Across Asia
CoralRaider Looks for Social Media Accounts That Contain Payment Information
April 5th, 2024Source or Source or Source or Source

Internet — Security Issues — April 4th, 2024

AI and telecom breakthroughs dominate 'Innovation of the Year' category for 2024 GeekWire Awards
It's a big year for artificial intelligence, telecom advances, and tools designed to make these emerging technologies safe and transparent, judging from the finalists in the category of Innovation of the Year.
April 4th, 2024Source

AI Deepfakes Rising as Risk for APAC Organisations
A cyber security expert from Tenable has called on large tech platforms to do more to identify AI deepfakes for users, while APAC organisations may need to include deepfakes in risk assessments.
April 4th, 2024Source

An anonymous coder nearly hacked a big chunk of the internet. How worried should we be?
Outside the world of open-source software, it's likely few people would have heard about XZ Utils, a small but widely used tool for data compression in Linux systems. But late last week, security experts uncovered a serious and deliberate flaw that could leave networked Linux computers susceptible to malicious attacks.
April 4th, 2024Source

Asia-Pacific Ransomware Threats Depend on Country and Sector, Says Rapid7
Cyber security operatives have been warned to look at the specific ransomware threats facing their country and industry, while closing down common pathways being used by skilled access brokers.
April 4th, 2024Source

Avast One Silver allows users to tailor their coverage based upon their personal preferences
Avast released a new product tier to the Avast One suite: Avast One Silver. The new offering takes a modular approach to cyber security, allowing people to tailor their coverage based upon their needs, personal preferences, or risk profiles.
April 4th, 2024Source

Breach Roundup: Omni Hotels Acknowledges Cyber Incident
Also: Insurer Predicts Ransomware for Cars, Offers to Cover Towing Costs
April 4th, 2024Source or Source or Source or Source or Source

Cancer center suffers major data breach by hackers affecting patient information
It is never a pleasure to talk about there being (yet) another entity that has suffered through a major data breach. But there is an additional amount of weight that comes with it being a cancer research center. Showing how long some of these groups can be when it comes to selecting targets. In this case, it was the City of Hope (cancer research center).
April 4th, 2024Source

Cloud Threat Detection Firm Permiso Raises $18 million
Cloud security firm provides a detection platform able to detect and predict the likely behavior of 'bad' identities.
April 4th, 2024Source

Computer scientists discover gap in the latest security mechanisms used by some chips
Over the past few years, hardware manufacturers have developed technologies that ought to make it possible for companies and governmental organizations to process sensitive data securely using shared cloud computing resources. Known as confidential computing, this approach protects sensitive data while it is being processed by isolating it in an area that is impenetrable to other users and even to the cloud provider.
April 4th, 2024Source

Critical Vulnerability in Progress Flowmon Allows Remote Access to Systems
A critical OS command injection in Progress Flowmon can be exploited to gain remote, unauthenticated access to the system.
April 4th, 2024Source

Cyberattack Causes Disruptions at Omni Hotels
Omni Hotels & Resorts tells customers that recent disruptions have been caused by a cyberattack that forced it to shut down systems.
April 4th, 2024Source

DOE Looks to Universities to Fix Energy Sector Cybersecurity
Energy Department Invests in Next Generation of Cyber Talent to Find New Solutions
April 4th, 2024Source or Source or Source or Source or Source

Five ways AI can boost your data backups
In the event of a data emergency -- say, a cyber attack or a natural disaster shutting down a data center -- no organization wants to worry about whether they have secure, up-to-date backups, and whether they can be easily recovered.
April 4th, 2024Source

Government review criticizes Microsoft for security lapses in "preventable" Exchange hack
An incident that "should never have occurred"
April 4th, 2024Source

Health Data Thefts Keep Coming; Millions Affected in 2024
Latest Exfiltration and Hacking Incidents Highlight Health Sector Cyber Challenges
April 4th, 2024Source or Source or Source or Source

Hoya's optics production and orders disrupted by cyberattack
Hoya Corporation, one of the largest global manufacturers of optical products, says a "system failure" caused servers at some of its production plants and business divisions to go offline on Saturday.
April 4th, 2024Source

Ivanti CEO Vows Cybersecurity Makeover After Zero-Day Blitz
Ivanti releases a carefully scripted YouTube video and an open letter from chief executive Jeff Abbott vowing to fix the entire security organization.
April 4th, 2024Source

Ivanti vows to transform its security operating model, reveals new vulnerabilities
Ivanti has released patches for new DoS vulnerabilities affecting Ivanti Connect Secure (SSL VPN solution) and Ivanti Policy Secure (NAC solution), some of which could also lead to execution of arbitrary code or information disclosure.
April 4th, 2024Source

Microsoft, Okta, CyberArk Lead Workforce Identity Rankings
OneLogin Departs Forrester's Leaderboard as User Experience Takes Center Stage
April 4th, 2024Source

Microsoft's Security Chickens Have Come Home to Roost
News analysis: SecurityWeek editor-at-large Ryan Naraine reads the CSRB report on China's audacious Microsoft's Exchange Online hack and isn't at all surprised by the findings.
April 4th, 2024Source

New HTTP/2 DoS Attack Potentially More Severe Than Record-Breaking Rapid Reset
New HTTP/2 DoS method named Continuation Flood can pose a greater risk than Rapid Reset, which has been used for record-breaking attacks.
April 4th, 2024Source

New privacy-preserving robotic cameras obscure images beyond human recognition
From robotic vacuum cleaners and smart fridges to baby monitors and delivery drones, the smart devices being increasingly welcomed into our homes and workplaces use vision to take in their surroundings, taking videos and images of our lives in the process.
April 4th, 2024Source or Source or Source or Source or Source or Source

NIST awards $3.6 million to address the cybersecurity workforce gap
The US Department of Commerce's National Institute of Standards and Technology (NIST) has awarded cooperative agreements totaling nearly $3.6 million aimed at building the workforce needed to safeguard enterprises from cybersecurity risks.
April 4th, 2024Source

Omni Hotels suffer prolonged IT outage due to cyberattack
Texas-based Omni Hotels & Resorts has been responding to a cyberattack that started last Friday, which resulted in the unavailability of many of its IT systems.
April 4th, 2024Source

Pixel Phone Zero-Days Exploited by Forensic Firms
Google this week patched two Pixel phone zero-day vulnerabilities actively exploited by forensic companies to obtain data from devices.
April 4th, 2024Source

Ransomware gang did steal residents' confidential data, UK city council admits
INC Ransom emerges as a growing threat as some ex-LockBit/ALPHV affiliates get new gigs
April 4th, 2024Source or Source or Source or Source or Source or Source

Should I disconnect my PC from the internet when I have a virus?
It is often recommended to disconnect the internet connection in the event of a virus attack. But is it really sensible or even necessary to disconnect the computer from the internet?
April 4th, 2024Source

SurveyLama Data Breach Impacts 4.4 Million Users
Data breach impacting users' personal information prompts survey rewards platform SurveyLama to reset passwords.
April 4th, 2024Source

Texas Police Busted a Man With Fake Apple Items Worth Over $20,000
Day after cops seized fake Apple products alongside counterfeit items worth £600,000 in Northern Ireland during two connected raids conducted in Belfast and Portadown on March 28, 2024, a guy from Texas has been charged with trademark counterfeiting after being discovered in possession of counterfeit Apple items valued at over $20,000.
April 4th, 2024Source

The best antivirus software and apps you can buy
Cyber threats are everywhere, which means you need to protect your devices. We found the best antivirus software and apps that will help keep you safe and secure.
April 4th, 2024Source

The Biggest Takeaways from Recent Malware Attacks
Among the never-ending list of malicious software that threat actors use in cyber attacks are viruses, worms, trojans, ransomware, spyware, and adware. Today's malware is not just about causing immediate damage; some programs get embedded within systems to siphon off data over time, disrupt operations strategically, or lay the groundwork for massive, coordinated attacks.
April 4th, 2024Source

The White House is Wrong: Section 702 Needs Drastic Change
With Section 702 of the Foreign Intelligence Surveillance Act set to expire later this month, the White House recently released a memo objecting to the SAFE Act—legislation introduced by Senators Dick Durbin and Mike Lee that would reauthorize Section 702 with some reforms.
April 4th, 2024Source

US Cancer Center Data Breach Impacting 800,000
City of Hope is notifying 800,000 individuals of a data breach impacting their personal and health information.
April 4th, 2024Source

Zoom Paid Out $10 Million via Bug Bounty Program Since 2019
Video conferencing giant Zoom has paid out $10 million through its bug bounty program since it was launched in 2019.
April 4th, 2024Source

Internet — Security Issues — April 2nd, 2024

3 UK Cyber Security Trends to Watch in 2024
Staying up to date with the latest in cyber security has arguably never been more paramount than in 2024. Financial services provider Allianz named cyber attacks this year's biggest risk for business in the U.K. and a top concern for businesses of all sizes for the first time.
April 2nd, 2024Source

AT&T data leaked: 73 million customers affected
AT&T has confirmed that the data set leaked on the dark web some two weeks ago does, indeed, contain "AT&T data-specific fields".
April 2nd, 2024Source

Biden, Xi Discuss Key Security Concerns in Bilateral Call
U.S. and Chinese Leaders Discuss Global Security Issues in Wide-Ranging Call
April 2nd, 2024Source or Source or Source or Source

Best Home Security Systems of 2024
Save yourself the hassle of researching home security. We've tested all the top systems, and these are the best.
April 2nd, 2024Source

Boat Dealer MarineMax Confirms Data Breach
MarineMax confirms suffering a data breach as a result of a recent ransomware attack, with the attackers claiming to have obtained 180,000 files.
April 2nd, 2024Source

Fastly Bot Management protects websites, apps, and valuable data from malicious automated traffic
Fastly introduced Fastly Bot Management to help organizations combat automated "bot" attacks at the edge and significantly reduce the risk of fraud, DDoS attacks, account takeovers, and other online abuse.
April 2nd, 2024Source

Feds Ask Telcos: How Are You Combating Location Tracking?
Federal Communications Commission Responds to Persistent Surveillance Problems
April 2nd, 2024Source or Source or Source or Source or Source

Firewalla launches protection for Wi-Fi 7 networks
The introduction of Wi-Fi 7 -- IEEE 802.11be to its friends -- marks a step forward in wireless speeds to cope with the five and 10 gigabit capabilities of fiber networks.
April 2nd, 2024Source

Fortinet upgrades its real-time network security operating system
Fortinet announced the latest version of its FortiOS operating system and other major enhancements to the company's cybersecurity platform, the Fortinet Security Fabric.
April 2nd, 2024Source

Heartbleed is 10 Years Old -- Farewell Heartbleed, Hello QuantumBleed!
Heartbleed made most certificates vulnerable. The future problem is that quantum decryption will make all certificates and everything else using RSA encryption vulnerable to everyone.
April 2nd, 2024Source

Hotel Self Check-In Kiosks Exposed Room Access Codes
Self check-in kiosks at Ibis Budget hotels were affected by a vulnerability that exposed keypad codes that could be used to enter rooms.
April 2nd, 2024Source

How AI Helps Assess Credit Risk, Navigate Complex Processes
Synechron's Ivan Perić on Mitigating Credit Issues, Ensuring Regulatory Compliance
April 2nd, 2024Source or Source or Source or Source or Source

How Meta's global head of safety approaches online age verification
Antigone Davis explains Meta's push for laws making app store providers responsible for age verification, and why its Quest VR store is a model.
April 2nd, 2024Source

How to Hire, Retain and Inspire Exceptional Employees
Leading Means Admitting What You Don't Know - And Other Tips for Leaders
April 2nd, 2024Source or Source or Source or Source

INC Ransom claims to be behind 'cyber incident' at UK city council
This follows attack on NHS services in Scotland last week
April 2nd, 2024Source

Judge Certifies 'Contract Class' in CareFirst Breach Lawsuit
Proposed Class Action in Cyberattack Has Faced Many Legal Ups and Downs Since 2015
April 2nd, 2024Source or Source or Source or Source or Source

LogRhythm Axon enhancements improve data management and operational efficiency
Recent global research reveals 61% of organizations still rely on manual and time-intensive methods for sharing security status updates. In response, LogRhythm announced its 8th consecutive quarterly release. The latest innovations to LogRhythm Axon facilitate seamless dashboard and search import/export to community repositories, bridging the communication gap.
April 2nd, 2024Source

Netskope CEO on What Platformization Means for Cybersecurity
CEO Sanjay Beri on What Distinguishes Genuine Integration From Mere Aggregation
April 2nd, 2024Source

New Chrome feature aims to stop hackers from using stolen cookies
Google announced a new Chrome security feature called 'Device Bound Session Credentials' that ties cookies to a specific device, blocking hackers from stealing and using them to hijack users' accounts.
April 2nd, 2024Source

OWASP Data Breach Caused by Server Misconfiguration
The OWASP Foundation says a wiki misconfiguration exposed resumes filed over a decade ago by aspiring members.
April 2nd, 2024Source

Prudential Financial Data Breach Impacts 36,000
Prudential Financial says the names, addresses, and ID numbers of over 36,000 were stolen in a February data breach.
April 2nd, 2024Source

Rubrik files to go public following alliance with Microsoft
Cloud cyber resilience model could raise $700M despite $278M losses
April 2nd, 2024Source

Security Flaw in WP-Members Plugin Leads to Script Injection
A cross-site scripting vulnerability in the WP-Members Membership plugin could allow attackers to inject scripts into user profile pages.
April 2nd, 2024Source

TechCrunch Minute: AT&T data breach prompts millions of passcodes to be reset
Death, taxes, and regular, terrifying cybersecurity leaks. Those are the facts of life, as the latest AT&T data breach is teaching us yet again. A TechCrunch investigation into leaked customer data from the American telco giant has led to AT&T resetting certain customer account passcodes to prevent them from being at risk.
April 2nd, 2024Source

Winnti's new UNAPIMON tool hides malware from security software
The Chinese 'Winnti' hacking group was found using a previously undocumented malware called UNAPIMON to let malicous processes run without being detected.
April 2nd, 2024Source

Veracode acquires Longbow Security to help organizations reduce application risk
Veracode announced the acquisition of Longbow Security, a pioneer in security risk management for cloud-native environments.
April 2nd, 2024Source

Internet — Security Issues — March 29th, 2024

Beware! Backdoor found in XZ utilities used by many Linux distros (CVE-2024-3094)
A vulnerability (CVE-2024-3094) in XZ Utils, the XZ format compression utilities included in most Linux distributions, may "enable a malicious actor to break sshd authentication and gain unauthorized access to the entire system remotely," Red Hat warns.
March 29th, 2024Source or Source

DHS Calls Political Campaigns 'Ripe Target' for Cyberattacks
Foreign Adversaries Increasingly See Campaigns as Prime for Hacking, Official Says
March 29th, 2024Source or Source or Source or Source or Source

Energy Department Invests $15 Million in University Cybersecurity Centers
The US Department of Energy announces $15 million funding for university-based electric power cybersecurity centers.
March 29th, 2024Source

Federal Elections Commission Considers Regulating AI
FEC Commissioner Says Group Is Exploring How to Regulate Campaign Deepfakes
March 29th, 2024Source or Source or Source or Source

Feds Warn of Credential Harvesting Threats in Healthcare
HHS Says Tried-and-True Hacker Methods Can Compromise Patient Data, Safety
March 29th, 2024Source or Source or Source or Source or Source

From Despair to Disruption: Zafran Takes on Cyber Mitigation
Amid COVID-19 Ransomware Woes, Sanaz Yashar's Frustration Sparked Zafran's Birth
March 29th, 2024Source or Source or Source or Source or Source

ISMG Editors: Apple's Antitrust Showdown With the Feds
Legal Expert Jonathan Armstrong Unpacks Issues in Big Tech, Ransomware, AI and More
March 29th, 2024Source or Source or Source or Source or Source

Malware Flood Causes PyPI to Temporarily Halt New Accounts
Hackers Are Now Using Code Repositories as Malware Vectors
March 29th, 2024Source or Source or Source or Source or Source

ShadowRay Attack Strikes AI Workloads
Thousands of AI Workloads Compromised Amid CVE Vulnerability Dispute
March 29th, 2024Source or Source or Source or Source or Source

The Complexity and Need to Manage Mental Well-Being in the Security Team
It is the CISO's responsibility to build and maintain a high functioning team in a difficult environment -- cybersecurity is a complex, continuous, and adversarial environment like none other outside of military conflict.
March 29th, 2024Source

UK Nuclear Cleanup Site Faces Criminal Cybersecurity Charges
Probe Finds 'Largest and Most Hazardous Nuclear Site' Violated Security Laws
March 29th, 2024Source or Source or Source or Source or Source

Internet — Security Issues — March 28th, 2024

AppViewX partners with Fortanix to address critical enterprise security challenges
AppViewX and Fortanix announced a partnership to offer cloud-delivered secure digital identity management and code signing.
March 28th, 2024Source

Malwarebytes adds AI to its business security offering
Malwarebytes is adding an AI feature to its Security Advisor, part of the ThreatDown tool aimed at helping IT teams make better use of their resources.
March 28th, 2024Source

Activision investigating password-stealing malware targeting game players
Video game giant Activision is investigating a hacking campaign that's targeting players with the goal of stealing their credentials, TechCrunch has learned.
March 28th, 2024Source

Breach Roundup: Russian Organizations Losing Microsoft Cloud
Also: Hackers Target Apple Password Reset Flaw
March 28th, 2024Source or Source or Source or Source

Can You Legally Record Audio or Video in Your Home? We've Got the Answers
Our guide can help you avoid the risk of lawsuits (or worse) for breaking privacy rules. Here are the laws you should know about and the practices to follow for home security cameras.
March 28th, 2024Source

CD Projekt Says 2023 Was Second Best Year in Its History While Posting $120 Million in Net Profits
Cyberpunk and Witcher developer calls 2023 a success despite last summer's layoffs.
March 28th, 2024Source

Chinese Cyberspies Targeting ASEAN Entities
Two Chinese cyberespionage groups have been targeting entities and member countries affiliated with ASEAN.
March 28th, 2024Source

CISA Moving Forward With Cyber Incident Reporting Rules Impacting 316,000 Entities
CISA is seeking comment on the implementation of CIRCIA, which will cost $2.6 billion and will impact 316,000 entities.
March 28th, 2024Source

Cisco Patches DoS Vulnerabilities in Networking Products
Cisco has released patches for multiple IOS and IOS XE software vulnerabilities leading to denial-of-service (DoS).
March 28th, 2024Source

Coro Raises $100 Million for All-in-One Security Platform
Coro has raised $100 million in Series D funding for its enterprise-grade platform tailored for the small- and mid-sized market.
March 28th, 2024Source

Coro, building cybersecurity for SMBs, locks down $100M at a $750M valuation
Enterprises and other large organizations have long been a lucrative and obvious target for cybercriminals, but in recent years — thanks to more sophisticated breach techniques and the rise of AI — small and medium businesses are now also very much on the map.
March 28th, 2024Source

Cryptohack Roundup: Sam Bankman-Fried Gets 25-Year Sentence
Also: US Sanctions for Russia-Linked DeFi, Coinbase Can't Escape SEC Lawsuit
March 28th, 2024Source or Source or Source or Source or Source

Cyberespionage Campaign Targets Government, Energy Entities in India
Threat intelligence firm EclecticIQ documents the delivery of malware phishing lures to government and private energy organizations in India.
March 28th, 2024Source

Cybersecurity Mesh: Overcoming Data Security Overload
A significant cybersecurity challenge arises from managing the immense volume of data generated by numerous IT security tools, leading organizations into a reactive rather than proactive approach.
March 28th, 2024Source

Details and Lessons Learned From the Ransomware Attack on the British Library
Although the attack on the national library of the UK occurred five months ago, the Library's infrastructure won't be rebuilt until mid-April 2024, and then the full restoration of systems and data can begin.
March 28th, 2024Source

Federal Elections Commission Considers Regulating AI
FEC Commissioner Says Group Is Exploring How to Regulate Campaign Deepfakes
March 28th, 2024Source

Feds Seek Secure-by-Design Armageddon for SQL Injection Bugs
Hackers Continue to Abuse Easily Preventable Vulnerability to Cause Massive Damage
March 28th, 2024Source or Source or Source or Source

Fortify your finances: A tactical guide to shielding against scams in 2024
Online shopping and banking may bring more convenience, but if you're not careful they can paint a target on your back.
March 28th, 2024Source

Hackers Developing Malicious LLMs After WormGPT Falls Flat
Crooks Are Recruiting AI Experts to Jailbreak Existing LLM Guardrails
March 28th, 2024Source or Source or Source or Source or Source

How AI Is Shaping an Inclusive and Diverse Future
AI's Transformative Impact and Challenges in Developing Regions
March 28th, 2024Source or Source or Source or Source or Source

INC Ransom claims responsibility for attack on NHS Scotland
Sensitive documents dumped on leak site amid claims of 3 TB of data stolen in total
March 28th, 2024Source

OMB Issues First Governmentwide AI Risk Mitigation Rules
Guidance Calls for Agencies to Appoint Chief AI Officers, Set Up Governance Boards
March 28th, 2024Source or Source or Source or Source or Source

Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)
The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2023-24955 -- a code injection vulnerability that allows authenticated attackers to execute code remotely on a vulnerable Microsoft SharePoint Server -- to its KEV catalog and is demanding that US federal civilian agencies implement the patch for it by April 16.
March 28th, 2024Source

PostgreSQL pioneer's latest brainchild promises time travel to dodge ransomware
Michael Stonbraker on the neat side effects of putting an operating system on top of a database
March 28th, 2024Source

Securing SMBs Globally: Coro Raises $100M to Go Into Europe
Series D Funding Will Strengthen Coro's Channel Program, European Market Presence
March 28th, 2024Source or Source or Source or Source or Source

Splunk Patches Vulnerabilities in Enterprise Product
Splunk patches high-severity vulnerabilities in Enterprise, including an authentication token exposure issue.
March 28th, 2024Source

The Witcher "Polaris" Still Pre-Production, Witcher Remake, Cyberpunk Sequel in Concept Phase
2023 was CDPR's second-best year ever, thanks to the sales of the Cyberpunk 2077: Phantom Liberty expansion, which managed to move 5 million copies, which is added to the 20 million in sales for the original Cyberpunk 2077. CDPR has also announced that The Witcher series surpassed 75 million units sold last year. So, yes, if you're doing the math (75 million for the Witcher, 25 million for Cyberpunk) CDPR has now sold over 100 million games. Not bad!
March 28th, 2024Source

Truck ELD hacking could put millions of vehicles at risk
The trucking industry is facing a critical cybersecurity threat that could impact millions of vehicles on the road. Electronic Logging Devices (ELDs), mandated for use in the United States and increasingly adopted worldwide, are essential for tracking drivers' hours to comply with work-hour regulations.
March 28th, 2024Source

UnitedHealth Admits Patient Data Was 'Taken' in Mega Attack
US Government Offers $10M Bounty to Track Down Leadership of BlackCat Crime Group
March 28th, 2024Source or Source or Source

US critical infrastructure cyberattack reporting rules inch closer to reality
After all, it's only about keeping the essentials on -- no rush
March 28th, 2024Source

US Offering $10 Million Reward for Information on Change Healthcare Hackers
The US is offering a reward of up to $10 million for information on BlackCat ransomware affiliates that targeted US critical infrastructure.
March 28th, 2024Source or Source

Zafran Emerges From Stealth With Risk and Mitigation Platform, $30M in Funding
Zafran has emerged from stealth mode with a risk and mitigation platform and $30 million in funding from Sequoia Capital and Cyberstarts.
March 28th, 2024Source

Snowflake Data Clean Rooms helps organizations preserve the privacy of their data
Snowflake introduced Snowflake Data Clean Rooms to customers in AWS East, AWS West, and Azure West, revolutionizing how enterprises of all sizes can securely share data and collaborate in a privacy-preserving manner to achieve high value business outcomes in the Data Cloud.
March 28th, 2024Source

These 17,000 unpatched Microsoft Exchange servers are a ticking time bomb
One might say this is a wurst case scenario
March 28th, 2024Source

Threat Indicators Show 2024 Is Already Promising to be Worse Than 2023
In just the first two months of 2024, threat intelligence firm Flashpoint has logged dramatic increases in all major threat indicators.
March 28th, 2024Source

Zero-day exploitation surged in 2023, Google finds
2023 saw attackers increasingly focusing on the discovery and exploitation of zero-day vulnerabilities in third-party libraries (libvpx, ImagelO) and drivers (Mali GPU, Qualcomm Adreno GPU), as they can affect multiple products and effectively offer more possibilities for attack.
March 28th, 2024Source

Internet — Security Issues — March 27th, 2024

AI framework vulnerability is being used to compromise enterprise servers (CVE-2023-48022)
Attackers are leveraging a vulnerability (CVE-2023-48022) in Anyscale's Ray AI software to compromise enterprise servers and saddle them with cryptominers and reverse shells.
March 27th, 2024Source

AI Opens Fraud Detection Gap, Says US Treasury
Department Says It May Contribute Its Own Data for Training Models
March 27th, 2024Source or Source or Source or Source or Source

Attackers leverage weaponized iMessages, new phishing-as-a-service platform
Scammers are leveraging the Darcula phishing-as-a-service platform, iMessages and Google Messages to great effect.
March 27th, 2024Source

AU10TIX's Digital ID suite identifies potentially fraudulent activities
AU10TIX announced the expansion of its Digital ID solution, which enables businesses to securely verify IDs of all types, including physical, digital, eID, verifiable credentials, and more.
March 27th, 2024Source

Brexit benefit: Porsche Boxster and Cayman axed in Europe, but survive in the UK!
Cybersecurity regulations mean the Porsche 718-generation sports cars will be killed-off this year on the continent
March 27th, 2024Source

Businesses still not ready for new DMARC rules
Despite them being widely publicized, Source" target="new" class="RM1">Google and Yahoo's new email rules still risk catching out many businesses.
March 27th, 2024Source

Change Healthcare Wake-Up Call: Is Sector Too Codependent?
Denise Anderson and Errol Weiss of Health-ISAC Discuss Critical Cyber Issues
March 27th, 2024Source or Source or Source or Source or Source

Chrome Update Patches Zero-Day Vulnerabilities Exploited at Pwn2Own
Google ships a security-themed Chrome browser refresh to fix flaws exploited at the CanSecWest Pwn2Own hacking contest.
March 27th, 2024Source

CISA Seeks Public Input on Cyber Incident Reporting Rules
US Cyber Defense Agency Proposes 72-Hour Reporting Rule for Covered Entities
March 27th, 2024Source or Source or Source or Source or Source

CISA: Second SharePoint Flaw Disclosed at Pwn2Own Exploited in Attacks
CISA says a second SharePoint vulnerability demonstrated last year at Pwn2Own, CVE-2023-24955, has been exploited in the wild.
March 27th, 2024Source

Code Execution Flaws Haunt NVIDIA ChatRTX for Windows
Artificial intelligence computing giant NVIDIA patches flaws in ChatRTX for Windows and warns of code execution and data tampering risks.
March 27th, 2024Source

CyberArk Secure Browser helps prevent breaches resulting from cookie theft
CyberArk launched CyberArk Secure Browser, an identity-centric secure browser, providing enhanced security and privacy alongside a familiar, productive user experience.
March 27th, 2024Source

Enhancing cyber security in financial services: Simulated cyber attacks
Simulated attacks allow financial institutions to test their incident response capabilities, evaluate the effectiveness of their security controls and identify areas for improvement
March 27th, 2024Source

Enterprise cybersecurity's lateral movement 'blind spot' [Q&A]
A lot of time, attention, and investment is spent on creating strong perimeters and endpoint defenses to prevent malicious actors from gaining access to corporate networks.
March 27th, 2024Source

French cyberdefence chief warns Paris Olympics a 'target'
The head of France's national cybersecurity agency said the Paris Olympics would be a "target" this year including for foreign states interested in "disrupting the opening ceremony or causing problems on public transport".
March 27th, 2024Source

Google Report: Despite Surge in Zero-Day Attacks, Exploit Mitigations Are Working
Despite a surge in zero-day attacks, data shows that security investments into OS and software exploit mitigations are forcing attackers to find new attack surfaces and bug patterns.
March 27th, 2024Source

Google: Spyware vendors behind 50% of zero-days exploited in 2023
Google's Threat Analysis Group (TAG) and Google subsidiary Mandiant said they've observed a significant increase in the number of zero-day vulnerabilities exploited in attacks in 2023, many of them linked to spyware vendors and their clients.
March 27th, 2024Source

iSoon Leak Shows Links to Chinese APT Groups
The Firm Is Operating Alongside RedHotel, RedAlpha and Poison Carp
March 27th, 2024Source or Source or Source or Source or Source

Malwarebytes adds AI functionality to ThreatDown Security Advisor
Malwarebytes has added AI functionality to its Security Advisor, available in every ThreatDown Bundle.
March 27th, 2024Source

More than 17 billion records compromised in 2023
Last year saw a 34.5 percent year-on-year increase in reported data breach incidents, with over 17 billion records compromised according to a new report from Flashpoint.
March 27th, 2024Source

More than half of organizations fall victim to cyberattacks
The latest Cybersecurity Readiness Index from Cisco shows that 53 percent of the respondents report falling victim to a cyber incident this past year, and many leaders (73 percent) believe that they will be a victim of a cybersecurity incident in the next 12-24 months.
March 27th, 2024Source

New Regulations Pose Compliance Challenges
How to Navigate New SEC Rules
March 27th, 2024Source or Source or Source or Source or Source

New variant of "TheMoon" malware enslaves thousands of insecure Asus routers into a malicious proxy
Cybercriminals have partnered in a novel botnet-as-a-service operation
March 27th, 2024Source

NTIA Pushes for Independent Audits of AI Systems
Accountability Needed to Unleash Full Potential of AI, Says NTIA Administrator
March 27th, 2024Source or Source or Source or Source or Source

On the Increase: Zero-Days Being Exploited in the Wild
Espionage Groups and Commercial Surveillance Vendors Tied to Many Zero-Day Exploits
March 27th, 2024Source or Source or Source or Source or Source

Organizations Informed of 10 Vulnerabilities in Rockwell Automation Products
In the past week Rockwell Automation addressed 10 vulnerabilities found in its FactoryTalk, PowerFlex and Arena Simulation products.
March 27th, 2024Source

Ransomware as a Service and the Strange Economics of the Dark Web
Ransomware is changing, fast. The past three months have seen dramatic developments among the ransomware ecosystem to include the takedown of LockBit's ransomware blog, BlackCat exiting the ecosystem, and the emergence of several smaller ransomware groups.
March 27th, 2024Source

Ray AI Framework Vulnerability Exploited to Hack Hundreds of Clusters
Disputed Ray AI framework vulnerability exploited to steal information and deploy cryptominers on hundreds of clusters.
March 27th, 2024Source

States step in to hasten provider recovery in wake of Change Healthcare cyberattack
Washington, Maryland and New Mexico have leveraged funding opportunities and regulatory tools to ease the burden on providers still struggling to operate with claims payments disrupted.
March 27th, 2024Source

Street newspaper appears to have Big Issue with Qilin ransomware gang
The days of cybercriminals having something of a moral compass are over
March 27th, 2024Source

Turning to a Career in Cybersecurity
Cyberthreats Are Rampant, Expertise Is Needed, and the Rewards Are Great
March 27th, 2024Source or Source or Source or Source or Source

Tycoon 2FA - The Criminals' Favorite Platform for MFA Theft
Phishing-as-a-Service Platform Lets Hackers Impersonate More Than 1,100 Domains
March 27th, 2024Source or Source or Source or Source or Source

Why our data might need protection from the future: Apple's 'Post-Quantum' security move
Computing giant Apple recently announced it was taking steps to protect the more than 1 billion people worldwide who use its iMessage app—from a threat that doesn't yet exist.
March 27th, 2024Source

Internet — Security Issues — March 25th, 2024

APT29 hit German political parties with bogus invites and malware
APT29 (aka Cozy Bear, aka Midnight Blizzard) has been spotted targeting German political parties for the first time, Mandiant researchers have shared.
March 25th, 2024Source

Data Protection Fines: UK Privacy Watchdog Updates Guidance
Regulator Emphasizes Upside of Transparency, Downside of Intentional Infringement
March 25th, 2024Source or Source or Source or Source or Source

Gartner Warns IAM Professionals Cyber Security Depends on Them
The rise of remote work, access via third-party providers and machine identities are just three reasons why cyber security depends on good identity and access management, Gartner has said.
March 25th, 2024Source

Hospitals Lobby Feds to Clarify Breach Duties in UHG Attack
AHA Wants Change Healthcare on Hook for Notification in Potential Breach
March 25th, 2024Source or Source or Source or Source or Source

Interos Resilience Watchtower enables companies to monitor vulnerabilities
Interos announced Interos Resilience Watchtower, a personalized risk technology that evolves organizations from monitoring to action.
March 25th, 2024Source

Leen Banks Early Stage Funding for Data Security Technology
Leen Security, a new startup building technology to help reduce chaos in the data security space, has banked a $2.8 million pre-seed funding.
March 25th, 2024Source

Over 100 Organizations Targeted in Recent 'StrelaStealer' Attacks
More than 100 organizations in the US and EU have been targeted in recent StrelaStealer infostealer campaigns.
March 25th, 2024Source

Preparing for a post-quantum security landscape [Q&A]
As widely available quantum computing draws closer, organizations need to consider the extent to which their supply chain presents risks and start building in post quantum readiness to their risk assessments.
March 25th, 2024Source

Report Urges Congress to Form an Armed Cyber Military Branch
Research Shows Military Suffers From Disjointed Cyber Operations Amid New Threats
March 25th, 2024Source or Source or Source or Source or Source

Scammers steal millions from FTX, BlockFi claimants
Customers of bankrupt crypto platform BlockFi have been targeted with a very convincing phishing email impersonating the platform, asking them to connect their wallet to complete the withdrawal of remaining funds.
March 25th, 2024Source

Tech trade union confirms cyberattack behind IT, email outage
Systems have been pulled offline as a precaution
March 25th, 2024Source

The AI Revolution and White-Collar Workers
Will AI Be a Catalyst for Innovation or a Source of Displacement?
March 25th, 2024Source or Source or Source or Source or Source

Time to examine the anatomy of the British Library ransomware nightmare
Mistakes years in the making tell a universal story that must not be ignored
March 25th, 2024Source

The OODA Loop: The Military Model That Speeds Up Cybersecurity Response
The OODA Loop can be used both by defenders and incident responders for a variety of use cases such as threat assessment, threat monitoring, and threat hunting.
March 25th, 2024Source

TikTok national security briefings "deeply troubling" and should be made public -- senators
Two senators who have received classified TikTok national security briefings say that the information revealed to them has left them "deeply troubled."
March 25th, 2024Source

UK blames China for massive breach of voter data
The U.K. government has blamed China for a 2021 cyberattack that compromised the personal information of millions of U.K. voters.
March 25th, 2024Source

UK Discloses Chinese Espionage Activities
Deputy Prime Minister Says Violet Typhoon Is Behind Attacks on UK Politicians
March 25th, 2024Source or Source or Source or Source

US sanctions APT31 hackers behind critical infrastructure attacks
The U.S. Treasury Department has sanctioned a Wuhan-based company used by the Chinese Ministry of State Security (MSS) as cover in attacks against U.S. critical infrastructure organizations.
March 25th, 2024Source

US Treasury Slaps Sanctions on China-Linked APT31 Hackers
The US Treasury Department sanctions a pair of Chinese hackers linked to "malicious cyber operations targeting US critical infrastructure sectors."
March 25th, 2024Source

White House Nominates First Assistant Secretary of Defense for Cyber Policy
Michael Sulmeyer has been nominated by the White House as the first assistant secretary of defense for cyber policy at the Pentagon.
March 25th, 2024Source

Why Endpoint Security Tools Are Still Such a Challenge
LinkedIn Chief Security Architect Calls for More Integration of Devices, Identities
March 25th, 2024Source or Source or Source or Source or Source

Vulnerability in virtual reality systems identified
A team of computer scientists at the University of Chicago has uncovered a potential vulnerability in virtual reality systems—one that could allow a hacker to insert what the team describes as an "inception layer" between a user's VR Home Screen and their VR User/Server.
March 25th, 2024Source

Internet — Security Issues — March 22nd, 2024

39,000 Websites Infected in 'Sign1' Malware Campaign
Over 39,000 websites have been infected with the Sign1 malware that redirects visitors to scam domains.
March 22nd, 2024Source

AI Is Making Payment Fraud Better, Faster and Easier
AI Is Also Making Traditional Scams More Convincing, Warns Visa
March 22nd, 2024Source or Source or Source or Source or Source

Apple Sued for Prioritizing Market Dominance Over Security
Lawsuit Says Apple Stifles Innovation, Degrades Security, Suppresses Protections
March 22nd, 2024Source or Source or Source or Source or Source

Apple Silicon has a hardware-level exploit that could leak private data
Fortunately, the odds are fairly low you'll have to worry about the theoretical threat in practice.
March 22nd, 2024Source

Apple's unfixable CPU exploit: 3 practical security takeaways
Intel and AMD have already had vulnerabilities exposed. Now it's Apple's turn—giving consumers much to ponder.
March 22nd, 2024Source

Biden's Economic Team Warns of AI Risks and Job Displacement
US Council of Economic Advisers Includes AI Section in Newly Released Report
March 22nd, 2024Source or Source or Source or Source

BlueFlag Security Emerges From Stealth With $11.5M in Funding
BlueFlag Security emerges from stealth mode with $11.5 million in a seed funding round led by Maverick Ventures and Ten Eleven Ventures.
March 22nd, 2024Source or Source or Source

'Brain Weasels': Impostor Syndrome in Cybersecurity
There are several attributes that tie the cybersecurity community together--namely our collective passion for solving complex problems in order to reduce harm -- but one has stood out prominently over the years: impostor syndrome.
March 22nd, 2024Source

China relaxes cross-border data rules after concern from foreign businesses
Ahead of a a high-profile business forum in Beijing which Apple CEO Tim Cook is attending, China has relaxed rules governing cross-border data flows, addressing a key concern of foreign businesses that had complained previous regulations were disrupting their operations.
March 22nd, 2024Source

CISA: Here's how you can foil DDoS attacks
In light of the rise of "DDoS hacktivism" and the recent DDoS attacks aimed at disrupting French and Alabama government websites, the Cybersecurity and Infrastructure Security Agency (CISA) has updated its guidance of how governmental entities (but also other organizations) should respond to this type of attacks.
March 22nd, 2024Source

CISOs: Make Sure Your Team Members Fit Your Company Culture
Why? Because 'Culture Eats Strategy for Breakfast,' as the Saying Goes
March 22nd, 2024Source or Source or Source

Cryptohack Roundup: Ray Eviscerates Bankman-Fried
Also: CryptoFX Ponzi Scheme, North Korean Hackers Gonna Hack
March 22nd, 2024Source or Source or Source

Denial-of-Service Attack Could Put Servers in Perpetual Loop
Researchers Spot Vulnerability in Application-Layer Communication Protocol
March 22nd, 2024Source or Source or Source

Ex-Secret Service agent and convicted hacker share stage at GISEC Global
A former United States Secret Service Agent and a Vietnamese former-hacker-turned-cybersecurity-specialist are set to reunite for the first time at GISEC Global 2024 to discuss their unique cat-and-mouse-style chase, which ultimately resulted in an arrest and conviction.
March 22nd, 2024Source

GitLab Acquires Oxeye to Bolster SAST in DevSecOps Workflow
Acquisition Promises Enhanced Application Security and Reduced False Positives
March 22nd, 2024Source

Hackers can exploit flaw in Apple M-series processors
Security researchers have found a serious exploit in all Apple M-series processors. The hard-wired flaw could potentially could be used by hackers to get user credit card information or read encrypted messages.
March 22nd, 2024Source

In Other News: Google's PQC Threat Model, Keyboard Sounds Expose Data, AI Roadmap
Noteworthy stories that might have slipped under the radar: Google's post-quantum cryptography threat model, keyboard typing sounds can expose data, DHS publishes AI roadmap.
March 22nd, 2024Source

Investors' pledge to fight spyware undercut by past investments in US malware maker
Cyber investors announced commitments to fighting spyware, but at least one firm previously invested in an exploit maker
March 22nd, 2024Source

ISMG Editors: How Will the Quantum Era Reshape Cybersecurity?
Also: US Regulators Backtrack on Web Tracker Privacy; ISMG's RSA 2024 Coverage
March 22nd, 2024Source or Source

Likely Chinese Hacking Contractor Is Quick to Exploit N-Days
UNC5174 Exploited F5 BIG-IP and ScreenConnect Vulnerabilities
March 22nd, 2024Source or Source or Source or Source or Source

Mozilla just ditched its privacy partner because its CEO is tied to data brokers
Mozilla will no longer partner with Onerep to help users find and take down personal information exposed on the web.
March 22nd, 2024Source or Watch Video

New 'GoFetch' Apple CPU Attack Exposes Crypto Keys
Researchers detail GoFetch, a new side-channel attack impacting Apple CPUs that could allow an attacker to obtain secret keys.
March 22nd, 2024Source

Nursing Home Declares Bankruptcy, Blames Recent Cyberattacks
Also, Senate Bill Proposes Payment Relief for Firms Meeting Cyber 'Standards'
March 22nd, 2024Source or Source or Source

Ransomware Group Takes Credit for Attack on Boat Dealer MarineMax
The Rhysida ransomware group has taken credit for the cyberattack on MarineMax and is offering to sell stolen data for 15 bitcoin.
March 22nd, 2024Source

Revenue Cycle Firm Settles GitHub PHI Breach Lawsuit for $7M
Class Action Settlement Also Calls for MedData to Enhance Its Security Program
March 22nd, 2024Source or Source or Source or Source or Source

Russian APT29 Hackers Caught Targeting German Political Parties
Russia's APT29 hacking group is expanding targets to political parties in Germany using a new backdoor variant tracked as Wineloader.
March 22nd, 2024Source

Russian hackers target German political parties with WineLoader malware
Researchers are warning that a notorious hacking group linked to Russia's Foreign Intelligence Service (SVR) is targeting political parties in Germany for the first time, shifting their focus away from the typical targeting of diplomatic missions.
March 22nd, 2024Source

Russian Nation-State Hacker Targets German Political Parties
Latest APT29 Campaign Uses a Previously Unseen Malware Backdoor
March 22nd, 2024Source or Source or Source

Saflok Lock Vulnerability Can Be Exploited to Open Millions of Doors
Vulnerability in Dormakaba's Saflok electronic locks allow hackers to forge keycards and open millions of doors.
March 22nd, 2024Source

Synopsys Greenlights Sale of $525M Application Security Unit
Software Integrity Business Could Fetch More Than $3B, Attract Private Equity Firms
March 22nd, 2024Source or Source

The Huge Security Hack That Might Make Travelers Feel Less Safe In Hotels
Hackers are always looking for new avenues to or steal vital personal information, and any sufficiently-advanced computer system can serve as one of those avenues for malicious purposes.
March 22nd, 2024Source

UK Official: AI in Defense Sector Is Not About Killer Robots
It Will Do Low-Level Tasks to Free Up Pros to Make Decisions, Say Researchers
March 22nd, 2024Source or Source or Source or Source or Source

UN Adopts US-Led International AI Safety Resolution
The Non-Binding Resolution Calls for 'Safe, Secure, and Trustworthy AI Systems'
March 22nd, 2024Source or Source or Source or Source or Source

US Government Issues New DDoS Mitigation Guidance
CISA, the FBI, and MS-ISAC have released new guidance on how federal agencies can defend against DDoS attacks.
March 22nd, 2024Source

US organizations targeted with emails delivering NetSupport RAT
Employees at US-based organizations are being targeted with emails delivering NetSupport RAT malware via "nuanced" exploitation and by using an advanced detection evasion method.
March 22nd, 2024Source

Vulnerability found in Apple's Silicon M-series chips -- and it can't be patched
Hackers can harvest encryption keys from Macs and MacBooks.
March 22nd, 2024Source

Which comes first? The pentest or the bug bounty program? [Q&A]
Bug bounty and penetration testing programs are often grouped as interchangeable, but they perform distinct functions.
March 22nd, 2024Source

Which Cyber Vendor Will Be First Off the IPO Starting Block?
Cato Networks, Rubrik, Snyk Are Interested in Going Public, But Have No Firm Plans
March 22nd, 2024Source or Source

Internet — Security Issues — March 20th, 2024

1 in 4 Organizations Shut Down OT Operations Due to Cyberattacks: Survey
A Palo Alto Networks survey shows many industrial organizations experience cyberattacks and 1 out of 4 has shut down OT operations.
March 20th, 2024Source

300,000 Systems Vulnerable to New Loop DoS Attack
Academic researchers describe a new application-layer loop DoS attack affecting Broadcom, Honeywell, Microsoft and MikroTik.
March 20th, 2024Source

A perfect storm: Assessing the deadly impact of climate-driven flooding and cyber attacks
Society is now in an era in which climate change and cyber insecurity are regular threats to life and property. In tandem, the two have the potential to be especially deadly.
March 20th, 2024Source

Apex Legends hacker said he hacked tournament games 'for fun'
On Sunday, the world of video games was shaken by a hacking and cheating scandal.
March 20th, 2024Source

Apiiro and Secure Code Warrior join forces for developer training integration
Apiiro has announced a product integration and partnership with Secure Code Warrior to extend its ASPM technology and processes to the people layer. The partnership combines Apiiro's deep code analysis and risk context with Secure Code Warrior's agile learning catalog to deliver developer training directly to developers in their tools and workflows.
March 20th, 2024Source

Atlassian Patches Critical Vulnerability in Bamboo Data Center and Server
Atlassian releases patches for two dozen vulnerabilities, including a critical-severity bug in Bamboo Data Center and Server.
March 20th, 2024Source

Chrome 123, Firefox 124 Patch Serious Vulnerabilities
Chrome and Firefox security updates released on Tuesday resolve a critical-severity and multiple high-severity vulnerabilities.
March 20th, 2024Source

Compliance failings leave enterprises vulnerable to data breaches
A new report from Thales reveals that 43 percent of enterprises failed a compliance audit last year, with those companies 10 times more likely to suffer a data breach.
March 20th, 2024Source

ControlUp Secure DX reduces endpoint management complexity
ControlUp announced Secure DX, a real-time scanning, detection, and remediation solution that improves the security posture of endpoint devices without compromising the digital employee experience.
March 20th, 2024Source

Cyber fusion -- what is it and why is it important for security? [Q&A]
Today's IT security teams face several key challenges. Tasked with combating the rising volume and frequency of sophisticated cyber threats, they are bombarded with a tsunami of alerts generated by countless security tools that deliver little context or value-add insight.
March 20th, 2024Source

Cyberattacks are targeting US water systems, warns EPA and White House
States are being asked to assess vulnerabilities at water utilities following attacks linked to the Chinese and Iranian governments.
March 20th, 2024Source

Cybersecurity attacks have the potential to infiltrate medical devices and cripple health care, expert warns
The cyberattack on Change Healthcare last month should serve as a wake-up call for the health care industry, which needs to focus on securing its infrastructure, says Kevin Fu, a Northeastern University professor of electrical and computer engineering and cybersecurity adviser to the White House.
March 20th, 2024Source

Cybersecurity in the UK: Government Sees Improvements Slow
Survey Finds Too Many Under-Engaged Boards, Reactive Attitudes, Low Appetite for AI
March 20th, 2024Source or Source or Source or Source or Source

DataDome Account Protect provides security for login and registration endpoints
DataDome launched DataDome Account Protect. This solution targets the growing threat of account takeovers and fake account creations that organizations worldwide face, providing robust security for login and registration endpoints against account-based attacks for business fraud purposes.
March 20th, 2024Source

DevSecOps: Bridging the Gap Between Speed and Security
The article covers how DevSecOps merges security with DevOps, focusing on quick, secure software development through automation and ongoing security checks.
March 20th, 2024Source

Elon Musk's X suspends users who post alleged name of alt-right comic creator
'StoneToss' webcomics frequently feature antisemitism, racism, and anti-LGBTQ sentiment.
March 20th, 2024Source

Email Bomb Attacks: Filling Up Inboxes and Servers Near You
HHS: Bot-Driven Attacks Can Overwhelm Email Servers, Networks and Disrupt Workflow
March 20th, 2024Source or Source or Source or Source or Source

First 'Cyberflasher' Convicted in England Gets Year in Prison for Sending Explicit Photo
The Crown Prosecution Service (CPS) in the United Kingdom has sentenced the first criminal as part of its new Online Safety Act that outlawed sending unsolicited photos of genitalia, otherwise known as "cyberflashing."
March 20th, 2024Source

Five Eyes Agencies Issue New Alert on Chinese APT Volt Typhoon
Government agencies in the Five Eyes countries warn critical infrastructure entities of Chinese state-sponsored hacking group Volt Typhoon.
March 20th, 2024Source

Glassdoor is tying real names to anonymous profiles without consent
That's probably the last place you would ever want your real name to be stored.
March 20th, 2024Source

Glassdoor reportedly attaches real names to anonymous accounts
The site where you can be honest about your employer might not be your friend.
March 20th, 2024Source

Growing AceCryptor attacks in Europe
ESET Research has recorded a considerable increase in AceCryptor attacks, with detections tripling between the first and second halves of 2023.
March 20th, 2024Source

Hacker Caught Stealing Personal Data of 132,000 Individuals Pleads Guilty
Idaho man pleads guilty to hacking charges over cyberattacks he conducted in 2017 and 2018, which involved data theft and extortion.
March 20th, 2024Source

Ivanti fixes critical Standalone Sentry bug reported by NATO
Ivanti warned customers to immediately patch a critical severity Standalone Sentry vulnerability reported by NATO Cyber Security Centre researchers.
March 20th, 2024Source

Ivanti fixes RCE vulnerability reported by NATO cybersecurity researchers (CVE-2023-41724)
Ivanti has fixed a critical RCE vulnerability (CVE-2023-41724) in Ivanti Standalone Sentry that has been reported by researchers with the NATO Cyber Security Centre.
March 20th, 2024Source

Microsoft Hires Influential AI Figure Mustafa Suleyman to Head up Consumer AI Business
Microsoft hired Mustafa Suleyman to head up its new AI business, adding an influential figure to its pool of talent leading the charge to build a technology that Suleyman views as both as a boon and threat to humanity.
March 20th, 2024Source

Nirmata Policy Manager combats cloud security threats
Nirmata announced new features for its flagship product, Nirmata Policy Manager. With today's increasing cloud security threats, detecting intrusions is no longer enough -- the damage may already be done. That's why Nirmata has developed Nirmata Policy Manager to proactively avert threats by eliminating security and compliance misconfigurations across Kubernetes clusters, CI/CD pipelines, and cloud services.
March 20th, 2024Source

Portnox Conditional Access for Applications improves data security for organizations
Portnox introduced its Conditional Access for Applications solution. Available as part of the Portnox Cloud platform, Conditional Access for Applications delivers easy-to-implement passwordless authentication, endpoint risk posture assessment, and automated endpoint remediation for organizations seeking to harden their application security posture.
March 20th, 2024Source

Privacy in the AI era: How do we protect our personal information?
The AI boom, including the advent of large language models (LLMs) and their associated chatbots, poses new challenges for privacy. Is our personal information part of a model's training data? Are our prompts being shared with law enforcement? Will chatbots connect diverse threads from our online lives and output them to anyone?
March 20th, 2024Source

Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security
Risky cyber security behaviours are putting employees at risk of phishing and other attacks, according to Proofpoint research, with many employees still unclear security is their responsibility, too.
March 20th, 2024Source

Quantum Computing: A New Dawn for Encryption Vulnerabilities
Expert Perspectives on Protecting Data and Developing Quantum-Safe Cryptography
March 20th, 2024Source or Source or Source or Source or Source

RaaS groups increasing efforts to recruit affiliates
Smaller RaaS groups are trying to recruit new and "displaced" LockBit and Alphv/BlackCat affiliates by foregoing deposits and paid subscriptions, offering better payout splits, 24/7 support, and other "perks".
March 20th, 2024Source

Researchers surprised by penned fish responses to robots
Norway leads the world when it comes to the use of robots in the aquaculture sector. But how do these robots actually impact on the fish? Cyberneticist Eleni Kelasidi is surprised by just how much.
March 20th, 2024Source

Risk Management Firm CyberSaint Raises $21 Million
Cyber risk management firm CyberSaint has raised $21 million in Series A funding, bringing the total investment to $29 million.
March 20th, 2024Source

Securing Cloud Infrastructure: Leveraging Key Management Technologies
This article explores the world of secure key management, the intricacies of KMS and HSM, their benefits, use cases, key considerations, and best practices.
March 20th, 2024Source

Serial extortionist of medical facilities pleads guilty to cybercrime charges
Robert Purbeck even went as far as threatening a dentist with the sale of his child's data
March 20th, 2024Source

SMBs are easy targets for cyberattacks
Despite cybersecurity threats being on the rise, many small and medium businesses (SMBs) still lack basic security measures, according to AI security company Cyber Upgrade.
March 20th, 2024Source

Spa Grand Prix email account hacked to phish banking info from fans
Hackers hijacked the official contact email for the Belgian Grand Prix event and used it to lure fans to a fake website promising a €50 gift voucher.
March 20th, 2024Source

Stalkerware usage surging, despite data privacy concerns
At least 31,031 people affected last year
March 20th, 2024Source

Tactics for Battling Attacks by Russia's Midnight Blizzard
As Nation-State Group Hacks Big Targets, Trellix's John Fokker Details Defenses
March 20th, 2024Source or Source or Source or Source or Source

The best free VPN for cybersecurity and streaming
Take your pick without spending a penny.
March 20th, 2024Source

The most prevalent malware behaviors and techniques
An analysis of 100,000+ Windows malware samples has revealed the most prevalent techniques used by malware developers to successfully evade defenses, escalate privileges, execute the malware, and assure its persistence.
March 20th, 2024Source

The Widening Career Opportunities for New College Graduates
New Grads Can Analyze IoT Data, Bring Talent and Innovative Thinking to Workplace
March 20th, 2024Source or Source or Source or Source or Source or Source

US CISA Urges Preventative Actions Against Volt Typhoon
Make Sure You Have Logs, Five Eyes Alliance Says
March 20th, 2024Source or Source or Source or Source or Source

US Expands Global Coalition on Commercial Spyware Misuse
White House Announces New Allies in Fight Against Misuse of Commercial Spyware
March 20th, 2024Source or Source or Source or Source or Source

US Sanctions 'Key Actors' in Russian Disinformation Campaign
Treasury Department Sanctions Heads of Russian 'Influence-for-Hire' Firms
March 20th, 2024Source or Source or Source or Source

US task force aims to plug security leaks in water sector
US government is urging state officials to band together to improve the cybersecurity of the country's water sector amid growing threats from foreign adversaries.
March 20th, 2024Source

Venafi Firefly with SPIFFE capability enables security teams to ensure governance and reduce risk
Venafi introduced SPIFFE (Secure Production Identity Framework For Everyone) support for Venafi Firefly, Venafi's lightweight workload identity issuer designed to support modern, highly distributed cloud native workloads.
March 20th, 2024Source

Which Cyber Vendor Will Be First Off the IPO Starting Block?
Cato Networks, Rubrik, Snyk Are Interested in Going Public, But Have No Firm Plans
March 20th, 2024Source or Source

White House Calls on States to Boost Cybersecurity in Water Sector
The White House is calling on state environmental, health, and homeland security agencies to convene on safeguarding water systems.
March 20th, 2024Source

White House warns of cyberattacks targeting critical US water systems
Water plants can be an easy target for hackers
March 20th, 2024Source

Why are your Windows Defender antivirus scans slow? Here's how to find out
If the scan of your hard drive with Microsoft Defender seems to take forever, it's worth finding out why.
March 20th, 2024Source

Why Cybereason Is Making Its 3rd Round of Layoffs Since 2022
Among Those Leaving Is Zohar Alon, Who Was Hired in 2023 to Spearhead Product, R&D
March 20th, 2024Source or Source or Source or Source or Source

Zoom Compliance Manager helps organizations fulfill regulatory requirements
Zoom announces Zoom Compliance Manager, an all-in-one offering that provides archiving, eDiscovery, legal hold, and information protection capabilities to help organizations fulfill regulatory requirements and mitigate organizational communications compliance risks across the Zoom platform.
March 20th, 2024Source

Internet — Security Issues — March 18th, 2024

7 Quick Wins to Boost Cyber Defenses with Microsoft Copilot
Corporate and cybersecurity leaders are starting to realize AI can be a pivotal ally in the fight against rising cyber threats. To illustrate, Microsoft Copilot for Security is already helping to streamline and enhance security operations and empower teams with AI-driven insights and efficiencies.
March 18th, 2024Source or Source or Source or Source or Source

43 million workers potentially affected in France Travail data breach
French national unemployment agency France Travail (formerly Pôle emploi) and Cap emploi, a government employment service for people with disabilities, have suffered a data breach that might have exposed personal data of 43 million people.
March 18th, 2024Source

AI in the Trenches
Customer Outcomes Using Microsoft Copilot for Security
March 18th, 2024Source or Source or Source or Source or Source

AI Infused with XDR, SIEM, and Threat Intelligence Set to Reshape Cybersecurity
Today's security tools capture a wealth of data. Yet when incidents occur, threat data from siloed platforms can take hours or days to gather, analyze and act upon. Correlating threat data takes time, as does developing the right remediation plans, stopping the attack, and sharing the results with colleagues.
March 18th, 2024Source or Source or Source or Source or Source

Apex Legends eSports event postponed by hacking claims
Organizers of the Apex Legends Global Series eSports tournament have postponed an event after two competitors appeared to be hacked while playing separate games during the North American finals.
March 18th, 2024Source

Apex Legends players worried about RCE flaw after ALGS hacks
Electronic Arts has postponed the North American (NA) finals of the ongoing Apex Legends Global Series (ALGS) after hackers compromised players mid-match during the tournament.
March 18th, 2024Source

BigID Raises $60M, Eyes M&A Around Data Security, Compliance
Data Security Vendor Retains Unicorn Status With Riverwood Capital-Led Growth Round
March 18th, 2024Source or Source or Source or Source or Source

Cash-Strapped Women's Clinic Sues UnitedHealth Over Attack
Lawsuit Claims Change Healthcare Outage Is Pushing Clinic, Others Into Bankruptcy
March 18th, 2024Source or Source or Source or Source or Source

Chinese Earth Krahang hackers breach 70 orgs in 23 countries
A sophisticated hacking campaign attributed to a Chinese Advanced Persistent Threat (APT) group known as 'Earth Krahang' has breached 70 organizations and targeted at least 116 across 45 countries.
March 18th, 2024Source

Cisco Completes $28 Billion Acquisition of Splunk
The networking giant paid $157 per share in cash for Splunk, a powerhouse in data analysis, security and observability tools, in a deal first announced in September 2023.
March 18th, 2024Source

Cryptographic algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B information - ITSP.40.111
Cryptographic algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B information is an UNCLASSIFIED publication issued by the Head, Canadian Centre for Cyber Security (Cyber Centre) and provides an update to and supersedes the previously published version. For more information, email, or phone:
March 18th, 2024Source

Don't be like these 900+ websites and expose millions of passwords via Firebase
Warning: Poorly configured Google Cloud databases spill billing info, plaintext credentials
March 18th, 2024Source

Fujitsu Data Breach Impacts Personal, Customer Information
Fujitsu says hackers infected internal systems with malware, stole personal and customer information.
March 18th, 2024Source

Fujitsu finds malware on company systems, investigates possible data breach
Fujitsu Limited, the largest Japanese IT services provider, has announced that several of the company's computers have been compromised with malware, leading to a possible data breach.
March 18th, 2024Source or Source

Fujitsu: Miscreants infected our systems with malware, may have stolen customer info
Sneaky software slips past shields, spurring scramble
March 18th, 2024Source

Fujitsu says it found malware on its corporate network, warns of possible data breach
Company apologizes for the presence of malware on company computers.
March 18th, 2024Source

Hacker Conversations: Stephanie 'Snow' Carruthers, Chief People Hacker at IBM X-Force Red
The desire to be a hacker is usually innate, and commonly emerges in early life. This did not happen with Snow: she was a married freelance special effects makeup artist when it all began.
March 18th, 2024Source

Health insurers split with US over relief after cyberattack
Health insurers and U.S. government officials are expected to meet next week to hash out differences over how to assist cash-strapped medical practices, as a cyberattack last month continues to hold up billions of dollars in payments.
March 18th, 2024Source

How the New NIST 2.0 Guidelines Help Detect SaaS Threats
The SaaS ecosystem has exploded in the six years since the National Institute of Standards and Technology's (NIST) cybersecurity framework 1.1 was released. Back in 2016-2017, when version 1.1 was initially drafted, SaaS held a small but significant place in the software market.
March 18th, 2024Source

IMF Emails Hacked
The International Monetary Fund (IMF) detects a cybersecurity incident that involved nearly a dozen email accounts getting hacked.
March 18th, 2024Source

IMF Investigating Cyber Incident Affecting Email Accounts
International Monetary Fund Provides Update After Detecting February Cyber Incident
March 18th, 2024Source or Source or Source

Infosec teams must be allowed to fail, argues Gartner
But failing to recover from incidents is unforgivable because 'adrenalin does not scale'
March 18th, 2024Source

Know Your Business Context Before Trying Microsegmentation
Hudl's CISO on Why Microsegmentation Isn't for Everyone on the Path to Zero Trust
March 18th, 2024Source

LockBit ransomware group member sentenced to four years for infecting over 1,000 systems
He must also pay a $635,000 fine
March 18th, 2024Source

Loft Labs simplifies multi-cluster Kubernetes management for Rancher users
Loft Labs announced vCluster for Rancher, enabling self-service virtual Kubernetes cluster creation and management for teams already using Rancher for Kubernetes management.
March 18th, 2024Source

Major Apex Legends Tournament Thrown Into Chaos By Hackers
Over the weekend, the hero shooter game Apex Legends, made by EA and Respawn Entertainment, held a tournament that was reportedly compromised by hackers. Multiple players' systems were breached, and game cheats such as X-ray vision and aimbots were installed.
March 18th, 2024Source

Microsoft announces collaboration with NVIDIA to accelerate healthcare and life sciences innovation with advanced cloud, AI and accelerated computing capabilities
Microsoft Corp. is expanding its collaboration with NVIDIA to bring the power of generative AI, the cloud and accelerated computing to healthcare and life sciences organizations. The collaboration will bring together the global scale, security and advanced computing capabilities of Microsoft Azure with NVIDIA DGX Cloud and the NVIDIA Clara suite of computing platforms, software and services to help healthcare and life sciences organizations accelerate innovation and improve patient care.
March 18th, 2024Source

Moldovan Operator of Credential Marketplace Sentenced to US Prison
Sandu Diaconu has been sentenced to 42 months in prison for operating a marketplace for compromised credentials.
March 18th, 2024Source

Nissan breach exposed data of 100,000 individuals
Nissan Oceania has confirmed that the data breach it suffered in December 2023 affected around 100,000 individuals and has begun notifying them.
March 18th, 2024Source

Pentagon Received Over 50,000 Vulnerability Reports Since 2016
Since 2016, the US DoD has received over 50,000 submissions through its vulnerability disclosure program.
March 18th, 2024Source

PoC Published for Critical Fortra Code Execution Vulnerability
A critical directory traversal vulnerability in Fortra FileCatalyst Workflow could lead to remote code execution.
March 18th, 2024Source

Ransomware Groups: Trust Us. Uh, Don't.
Review of Attacks Finds Inconsistent Data Leaks and Victim Naming, Broken Promises
March 18th, 2024Source or Source or Source or Source or Source

Ransomware Hackers May Be Exploiting Aiohttp Library Bug
The Python Library Flaw Allows Directory Traversal Attacks
March 18th, 2024Source or Source or Source or Source or Source

Security Bite: Here's what malware your Mac can remove
Ever wonder what malware can your Mac detect and remove without any third-party software? Recently, security researchers have correlated some bizarre macOS YARA rules used by the built-in XProtect suite with their public names. Here's what malware it looks for...
March 18th, 2024Source

Team develops blockchain-based method to protect and manage personal data on the internet
Entering a website and accepting cookies is a very common and oft-repeated gesture when navigating the Internet. But this small action, which is often done automatically and without thought, entails security risks: By consenting to cookies, you lose control over your sensitive information, as you cannot review the conditions you have just accepted.
March 18th, 2024Source

Tech giant Fujitsu says it was hacked, warns of data breach
Multinational technology giant Fujitsu confirmed a cyberattack in a statement Friday, and warned that hackers may have stolen personal data and customer information.
March 18th, 2024Source

TMChecker Tool Lowers Barrier for Malicious Hacking
Tool Is Available for $200 a Month on Hacking Forums
March 18th, 2024Source or Source or Source or Source or Source

Internet — Security Issues — March 15th, 2024

43 Million Possibly Impacted by French Government Agency Data Breach
Recent data breach at unemployment agency France Travail (Pôle Emploi) could impact 43 million people.
March 15th, 2024Source

AI-Led Edge Computing Spends to Reach $350B Soon
Artificial intelligence is turning everything it touches into a golden investment opportunity. Edge computing - which is set to play a pivotal role in deploying AI, according to International Data Corp. - is in line to receive $350 billion worth of investments by 2027.
March 15th, 2024Source or Source or Source or Source or Source

As if working at Helldesk weren't bad enough, IT helpers now targeted by cybercrims
Wave of Okta attacks mark what researchers are calling the biggest security trend of the year
March 15th, 2024Source

Codezero Raises $3.5 Million for DevOps Security Solution
Secure enterprise microservices development firm Codezero raises $3.5 million in seed funding.
March 15th, 2024Source

Criminals take over family's Cricket account and drain their bank and investment apps
We've been trying to warn you about how real the threat of SIM Swapping is. By obtaining a SIM connected to your mobile account, a thief can use a burner phone, insert the SIM card, and take over your apps including financial apps. As a result, these criminals will drain your bank accounts, and max out your credit cards. It's scary, to be sure.
March 15th, 2024Source

Dark web election posts up almost 400 percent
The number of new posts on dark web forums about elections surged by 394 percent in 2023 compared to 2022, research released this week by cybersecurity firm NordVPN reveals. And in the first two months of 2024 alone, users have already published almost half as many posts.
March 15th, 2024Source

Discontinued Security Plugins Expose Many WordPress Sites to Takeover
Thousands of WordPress sites are at risk of takeover due to a critical privilege escalation vulnerability in two closed MiniOrange plugins.
March 15th, 2024Source

Experts Say Chinese Safes Pose Risks to US National Security
A senior U.S. senator is raising concerns that Beijing may be able to gain unauthorized access to commercial electronic safes made in China and used by the American public.
March 15th, 2024Source or Source or Source or Source

Google Chrome gets real-time phishing and malware protection with upgraded Safe Browsing feature
It will be available on all desktop and mobile platforms by the end of this month
March 15th, 2024Source

Illicit Credentials Marketplace Admin Gets 42-Month Sentence
A co-administrator of an illicit online marketplace received a 42-month prison sentence in U.S. federal court after pleading guilty to two criminal counts that could have put him in prison for 15 years.
March 15th, 2024Source or Source or Source or Source or Source

In Other News: CISA Hacked, Chinese Lock Backdoors, Exposed Secrets
Noteworthy stories that might have slipped under the radar: CISA hacked via Ivanti vulnerabilities, Chinese electronic lock backdoors, secrets exposed on GitHub.
March 15th, 2024Source

International Monetary Fund email accounts hacked in cyberattack
The International Monetary Fund (IMF) disclosed a cyber incident on Friday after unknown attackers breached 11 IMF email accounts earlier this year.
March 15th, 2024Source

ISMG Editors: Inside the Politics of US Cybersecurity
In the latest weekly update, Grant Schneider of Venable LLP joined three Information Security Media Group editors to discuss the future of U.S. federal cybersecurity and privacy legislation, AI integration and recent CISA developments - all set against a backdrop of political complexities.
March 15th, 2024Source or Source or Source or Source or Source

McDonald's: Global outage was caused by "configuration change"
McDonald's has blamed a third-party service provider's configuration change, not a cyberattack, for the global outage that forced many of its fast-food restaurants to close.
March 15th, 2024Source

Microsoft is once again harassing Chrome users with malware-like Bing ads
Microsoft is back to its classic tactics of harassing users to make them switch from competing services. Multiple posts on Reddit and other social media report that the company is once pedaling malware-like popup banners asking Chrome users to set Bing as the default search engine in exchange for free access to GPT-4.
March 15th, 2024Source

Pentagon Appoints New Chief Artificial Intelligence Officer
The first-ever head of the Pentagon's Chief Digital and Artificial Intelligence Office is stepping down from his post in April after building the newly created division into a highly influential component of the department and its operations.
March 15th, 2024Source or Source or Source or Source

Pressure Mounts on Meta to Scrap 'Pay or OK' Model in EU
Facebook's attempt to navigate European privacy regulations by giving users a fee-based opt-out from behavioral advertising triggered backlash from more than a dozen European politicians who accused the social media giant of treating human rights as a commodity.
March 15th, 2024Source or Source or Source or Source or Source

Protecting Medical Devices Against Future Cyberthreats
Healthcare organizations and makers of medical devices need to think about how to safeguard their critical medical gear against future cyberthreats, including the looming dangers posed by quantum computing, said Mike Nelson, global vice president of digital trust at security firm DigiCert.
March 15th, 2024Source or Source or Source or Source or Source

QNAP Systems Patches Critical Vulnerability
QNAP Systems on Saturday released a patch for a critical bug that allows unauthorized access to devices without authentication.
March 15th, 2024Source or Source or Source or Source or Source

Ransomware Groups' Data Leak Blogs Lie: Stop Trusting Them
Ransomware gangs are not reliable sources of information. Groups that run data leak blogs - and not all do - use them to pressure new and future victims into paying for the promise of either a decryptor or a pledge to delete stolen data.
March 15th, 2024Source or Source or Source or Source or Source

Sophos: Cyber Security Professional Burnout Is Widespread, Creating Risk for APAC Organisations
Burnout and fatigue among cyber professionals are leading to flow-on consequences like more data breaches, employee apathy to cyber duties and turnover of cyber workforces during a skills crisis.
March 15th, 2024Source

The SAFE Act to Reauthorize Section 702 is Two Steps Forward, One Step Back
Section 702 of the Foreign Intelligence Surveillance Act (FISA) is one of the most insidious and secretive mass surveillance authorities still in operation today. The Security and Freedom Enhancement (SAFE) Act would make some much-needed and long fought-for reforms, but it also does not go nearly far enough to rein in a surveillance law that the federal government has abused time and time again.
March 15th, 2024Source

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate
Red Canary's 2024 Threat Detection Report is based on analysis of almost 60,000 threats across 216 petabytes of telemetry from over 1,000 customers' endpoints.
March 15th, 2024Source

Transforming a Cyber Program in the Aftermath of an Attack
In the aftermath of a ransomware attack several years ago, Hackensack Meridian Health embarked on transforming its cybersecurity program with the support of top leadership and increased funding and staff and by implementing critical security tools and best practices, said CISO Mark Johnson.
March 15th, 2024Source or Source or Source or Source or Source

Why Are There Fewer Women Than Men in Cybersecurity?
The underrepresentation of women in cybersecurity is a complex issue that reflects broader societal, educational and workplace factors. Despite the critical importance of cybersecurity in safeguarding our digital world, women are significantly underrepresented in this field. This disparity not only highlights industry-wide issues of equality and diversity, but it also underscores a missed opportunity for cybersecurity teams to benefit from a wider range of perspectives and skills.
March 15th, 2024Source or Source or Source or Source or Source

Why Wiz Wants to Buy Cloud Startup Gem Security for $350M
Cloud security phenom Wiz's reported that it is pursuing an additional $800 million in funding just a year after raising $300 million in capital - a move that surprised industry observers.
March 15th, 2024Source or Source or Source or Source or Source

You May Need Your COLA Letter This Year. Where to Find It
If you accidentally tossed your cost-of-living adjustment letter from the Social Security Administration, we can help.
March 15th, 2024Source

Zscaler Expands AI Security Capabilities by Acquiring Avalor
Zscaler bought a data security startup led by a longtime Salesforce executive to help customers stay ahead of threats by beefing up data quality and AI models.
March 15th, 2024Source or Source or Source

Internet — Security Issues — March 14th, 2024

Amid paralyzing ransomware attack, feds probe UnitedHealth's HIPAA compliance
UnitedHealth said it will cooperate with the probe as it works to restore services.
March 14th, 2024Source

As Attackers Refine Tactics, 'Speed Matters,' Experts Warn
Advanced attackers increasingly feel the need for speed, sometimes requiring "only a couple of hours between compromise and exfiltration" of data.
March 14th, 2024Source or Source or Source

Ballistic Ventures Closes $360 Million Cybersecurity-Focused Fund
Venture capital firm Ballistic Ventures closed an oversubscribed $360 million fund that will be used to fund cybersecurity companies.
March 14th, 2024Source

Bill That Could Ban TikTok Passed in the House. Here's What to Know
The House passed legislation that would ban TikTok if its China-based owner ByteDance doesn't sell its stakes in the popular social media platform within six months of the bill's enactment.
March 14th, 2024Source

Boat Dealer MarineMax Hit by Cyberattack
MarineMax, one of the world's largest retailers of recreational boats and yachts, discloses a cyberattack.
March 14th, 2024Source

BotGuard Raises $13 Million to Protect Against Harmful Web Traffic
BotGuard OU raises $13 million in Series A funding to help hosting providers filter traffic and protect infrastructures.
March 14th, 2024Source

Breach Roundup: US FCC Authorizes IoT Cybersecurity Label
Every week, Information Security Media Group rounds up cybersecurity incidents and breaches around the world. This week, the FCC OK'd cybersecurity labeling, DarkGate exploited Google, Fortinet patched a bug, cyberattacks hit the French government and employment agencies, Google restricted Gemini AI chatbot and paid bug bounties, Microsoft had Patch Tuesday, Marine Max was attacked, and Alcasec moved on.
March 14th, 2024Source or Source or Source or Source or Source

Cado Security enables organizations to investigate and respond to potential M365 threats
Cado Security announced that the Cado platform now enables customers to acquire Microsoft 365 Unified Audit Log (UAL) to help investigate and respond to Microsoft 365 compromises such as business email compromise (BEC), account takeover (ATO), and insider threats.
March 14th, 2024Source

Chrome's Standard Safe Browsing Now Has Real-Time URL Protection
Chrome's standard Safe Browsing protections now provide real-time malicious site detection and Password Checkup on iOS now flags weak passwords.
March 14th, 2024Source

Cisco Patches High-Severity IOS RX Vulnerabilities
Cisco releases patches for high-severity denial-of-service and elevation of privilege vulnerabilities in IOS RX software.
March 14th, 2024Source

Cloud Network Security with Agility and Scale on a Platform
Agility, scale and consumption - these are three business benefits brought to cloud network security by Palo Alto Networks Software Firewalls. Tiffany Henry and Katherine Rigdon of Palo Alto Networks showcase these features and the value of finding them all on a single platform.
March 14th, 2024Source or Source or Source or Source or Source

Concentric AI introduces Copilot data risk module
Concentric AI announced its new Copilot data risk module that delivers data security governance of Copilot data inputs and outputs to ensure that sensitive data -- from financial information to IP to business data -- remains protected within the organization.
March 14th, 2024Source

Critical FortiClient EMS vulnerability fixed, (fake?) PoC for sale (CVE-2023-48788)
A recently fixed SQL injection vulnerability (CVE-2023-48788) in Fortinet's FortiClient Endpoint Management Server (EMS) solution has apparently piqued the interest of many: Horizon3's Attack Team means to publish technical details and a proof-of-concept exploit for it next week, and someone is attempting to sell a PoC for less than $300 via GitHub.
March 14th, 2024Source

Cryptohack Roundup: Crypto Losses Mount as Phishing Rages
Every week, Information Security Media Group rounds up cybersecurity incidents in digital assets. This week, amounts for crypto and phishing losses were released, the Bitcoin Fog operator was convicted, the EU approved rules to strengthen sanctions, the federal government sought to recover losses linked to pig butchering, and the Philippines blocked unlicensed crypto websites.
March 14th, 2024Source or Source or Source or Source

Cyber Madness Bracket Challenge -- Register to Play
SecurityWeek's Cyber Madness Bracket Challenge is a contest designed to bring the community together in a fun, competitive way through one of America's top sporting events.
March 14th, 2024Source

Elevate Your Security Posture: Grafana for Real-Time Security Analytics and Alerts
This article provides a detailed walkthrough on setting up Grafana for real-time security monitoring, crafting insightful dashboards, and configuring effective alerts.
March 14th, 2024Source

Feds Launch Investigation Into Change Healthcare Attack
UnitedHealth Group has yet to publicly confirm whether the cyberattack on its Change Healthcare IT services unit has resulted in a data breach. That's not stopping federal regulators from launching a full-fledged investigation into a massive compromise of protected health information potentially affecting millions of individuals.
March 14th, 2024Source or Source or Source or Source or Source

Four Common CI/CD Pipeline Vulnerabilities
The continuous integration/continuous delivery (CI/CD) pipeline can contain numerous vulnerabilities for hackers to exploit. Here's how to address them.
March 14th, 2024Source

French unemployment agency data breach impacts 43 million people
France Travail is the French governmental agency responsible for registering unemployed individuals, providing financial aid, and assisting them in finding jobs.
March 14th, 2024Source

Government Launches Probe Into Change Healthcare Data Breach
The HHS is investigating whether protected health information was compromised in the Change Healthcare data breach.
March 14th, 2024Source

Hackers Hiding Keylogger, RAT Malware in SVG Image Files
Threat actors are hiding malware in SVG image files to evade detection and deliver ransomware, download a banking Trojan and distribute malware.
March 14th, 2024Source or Source or Source or Source

Halo Security Dark Web Monitoring identifies and mitigates potential exposures
Halo Security intoduced its new Dark Web Monitoring feature. This addition further enhances the company's external security platform, allowing security teams to gain insights into potential threats originating from the dark web.
March 14th, 2024Source

HHS opens investigation into UnitedHealth cyberattack
Following a cyberattack on one of the nation's largest health insurers that's thrown health care payments into disarray and likely exposed reams of private patient data, the U.S. Department of Health and Human Services said Wednesday it has begun an investigation into the incident.
March 14th, 2024Source

Immutability: A boost to your security backup
As the volume of data continues to increase and the threat landscape continues to evolve, it is increasingly important for organizations to protect backup data from unwanted deletion. Threats today can take the form of a malicious insider deleting backup data or a targeted cyberattack on the backups themselves.
March 14th, 2024Source

LockBit ransomware kingpin gets 4 years behind bars
Canadian-Russian said to have turned to a life of cybercrime during pandemic, now must pay the price -- literally
March 14th, 2024Source

Maybe It's a Health Care Election After All
Julie Rovner is chief Washington correspondent and host of KFF Health News' weekly health policy news podcast, "What the Health?" A noted expert on health policy issues, Julie is the author of the critically praised reference book "Health Care Politics and Policy A to Z," now in its third edition.
March 14th, 2024Source

Microsoft's AI-Powered Copilot for Security Set for Worldwide Release
Microsoft announces that its Copilot for Security generative AI security solution will become generally available on April 1.
March 14th, 2024Source

Nissan confirms ransomware attack exposed data of 100,000 people
Nissan Oceania is warning of a data breach impacting 100,000 people after suffering a cyberattack in December 2023 that was claimed by the Akira ransomware operation.
March 14th, 2024Source

Nissan Data Breach Affects 100,000 Individuals
Nissan is notifying roughly 100,000 individuals of a data breach resulting from a ransomware attack conducted by the Akira cybercrime group.
March 14th, 2024Source

Perception Point GPThreat Hunter allows cybersecurity experts to focus on in-depth investigations
Perception Point launched its latest innovation, GPThreat Hunter, an addition to the company's comprehensive security stack.
March 14th, 2024Source

Planning for Healthcare IT Resiliency on a Regional Basis
It's critical for hospitals and other firms to not only prepare for how they will respond to a cyberattack, but also consider the regional impact if a neighboring provider of services needed in the community is disrupted by a serious cyber incident, said Margie Zuk of Mitre.
March 14th, 2024Source or Source or Source or Source or Source

PoC for critical Arcserve UDP vulnerabilities published (CVE-2024-0799, CVE-2024-0800)
Arcserve has fixed critical security vulnerabilities (CVE-2024-0799, CVE-2024-0800) in its Unified Data Protection (UDP) solution that can be chained to upload malicious files to the underlying Windows system.
March 14th, 2024Source

QuProtect Core Security secures Cisco routers against quantum threats
QuSecure unveiled QuProtect Core Security, a product designed to fortify existing Cisco router-to-router communications against emerging quantum threats.
March 14th, 2024Source

Shadow AI -- Should I be Worried?
Overzealous policies and blanket bans on AI tools risk forcing users underground to use unknown tools with unknown consequences.
March 14th, 2024Source

Some QNAP NAS devices affected by a critical vulnerability, updates available right now
The company is once again scrambling to improve security of its network OSes
March 14th, 2024Source

StopCrypt: Most widely distributed ransomware evolves to evade detection
A new variant of StopCrypt ransomware (aka STOP) was spotted in the wild, employing a multi-stage execution process that involves shellcodes to evade security tools.
March 14th, 2024Source

Study exposes failings of measures to prevent illegal content generation by text-to-image AI models
Researchers at NYU Tandon School of Engineering have revealed critical shortcomings in recently-proposed methods aimed at making powerful text-to-image generative AI systems safer for public use.
March 14th, 2024Source

UK Council's Vision: Set High Standards in Cybersecurity
Six years after it was founded, the government-backed U.K. Cyber Security Council is taking a multipronged approach to building professionalism in the industry. Board Chair Claudia Natanson discussed the council's journey, its role in shaping industry standards and efforts to foster diversity and narrow the skills gap.
March 14th, 2024Source or Source or Source or Source or Source

US to probe Change Healthcare's data protection standards as lawsuits mount
Services slowly coming back online but providers still struggling
March 14th, 2024Source

Why HHS' Cybersecurity Goals Aren't Necessarily Voluntary
Healthcare sector entities need to focus their attention on meeting the "voluntary" essential and enhanced cybersecurity performance goals set out by federal regulators before those recommendations become regulatory mandates, said Kate Pierce, virtual information security officer at Fortified Heath Security.
March 14th, 2024Source or Source or Source or Source or Source

Zscaler Acquires Avalor for $350 Million
Zscaler acquires Avalor, a risk management platform powered by Data Fabric for Security, for $350 million.
March 14th, 2024Source

Zscaler buys Avalor to bring more AI into its security tools
Zscaler, a cloud security company with headquarters in San Jose, California, has acquired cybersecurity startup Avalor 26 months after its founding, reportedly for $310 million in cash and equity.
March 14th, 2024Source or Source or Source

Internet — Security Issues — March 11th, 2024

British Library pushes the cloud button, says legacy IT estate cause of hefty rebuild
Five months in and the mammoth post-ransomware recovery has barely begun
March 11th, 2024Source

Broadcom Merges Symantec and Carbon Black Into New Business Unit
Fresh off its $69 billion acquisition of VMware, Broadcom creates an Enterprise Security Group unit that merges Symantec and Carbon Black.
March 11th, 2024Source

Critical Considerations for AI Developments in Healthcare
Artificial intelligence has enormous potential for transforming and reimagining all aspects of healthcare but mitigating the risks requires a collaborative, comprehensive approach that prioritizes data security, regulatory compliance and ethical considerations, said Sunil Dadlani, CIO and CISO at Atlantic Health System.
March 11th, 2024Source or Source or Source or Source or Source

Cynerio extends Healthcare Cybersecurity Platform to improve patient data protections
As data breaches continue to expose sensitive healthcare information, with over 118 million patients impacted in the United States in 2023, Cynerio has extended its commitment to enhancing cybersecurity in the healthcare sector.
March 11th, 2024Source

Equilend warns employees their data was stolen by ransomware gang
New York-based securities lending platform EquiLend Holdings confirmed in data breach notification letters sent to employees that their data was stolen in a January ransomware attack.
March 11th, 2024Source

EU's use of Microsoft 365 found to breach data protection rules
A lengthy investigation into the European Union's use of Microsoft 365 has found the Commission breached the bloc's data protection rules through its use of the cloud-based productivity software.
March 11th, 2024Source

If your Business Needs Cybersecurity, you Should Become the Expert
Cybercrime is more rampant than ever these days, and it's not just big companies that need to worry about it. Individuals and small businesses owe it to themselves to invest in cybersecurity, too.
March 11th, 2024Source

Italian Data Regulator Launches Probe Into OpenAI's Sora
The Italian data protection regulator opened a privacy inquiry to Sora, OpenAI's newly announced text-to-video artificial intelligence model.
March 11th, 2024Source or Source or Source or Source or Source

Kremlin accuses America of plotting cyberattack on Russian voting systems
Don't worry, we have a strong suspicion Putin's still gonna win
March 11th, 2024Source

Microsoft: Russian hackers accessed internal systems, code repositories
Midnight Blizzard (aka APT29), a group of Russian hackers tied to the country's Foreign Intelligence Service (SVR), has leveraged information stolen from Microsoft corporate email systems to burrow into the company's source code repositories and internal systems.
March 11th, 2024Source

Okta says data leaked on hacking forum not from its systems
Okta denies that its company data was leaked after a threat actor shared files allegedly stolen during an October 2023 cyberattack on a hacker forum.
March 11th, 2024Source

Possibly Exploited Fortinet Flaw Impacts Many Systems, but No Signs of Mass Attacks
150,000 systems possibly impacted by the recent Fortinet vulnerability ​​CVE-2024-21762, but there is still no evidence of widespread exploitation.
March 11th, 2024Source

Recent TeamCity Vulnerability Exploited in Ransomware Attacks
Servers impacted by recently patched TeamCity vulnerability CVE-2024-27198 targeted in ransomware attacks and abused for DDoS.
March 11th, 2024Source

Researchers expose Microsoft SCCM misconfigs usable in cyberattacks
Security researchers have created a knowledge base repository for attack and defense techniques based on improperly setting up Microsoft's Configuration Manager, which could allow an attacker to execute payloads or become a domain controller.
March 11th, 2024Source

SecurityWeek Cyber Insights 2024 Series
SecurityWeek talks to hundreds of industry experts from dozens of companies covering seven primary topics.
March 11th, 2024Source

Software Reliability Firm Steadybit Raises $6 Million
Steadybit was founded in 2019 and has now raised a total of $13.8 million in funding.
March 11th, 2024Source

The best security keys you can buy: Expert tested
We tested the best security keys that can help keep your online accounts safe from hackers and phishing attacks.
March 11th, 2024Source

UK Conservatives Say 'No' to Cyber Insurance Backstop
The Conservative government of British Prime Minister Rishi Sunak says it won't champion a reinsurance plan for cyber insurance similar to flood insurance, telling a parliamentary committee that it believes government action would "damage competition."
March 11th, 2024Source or Source or Source or Source or Source

Ultimate Member Plugin Flaw Exposes 100,000 WordPress Sites to Attacks
A high-severity XSS vulnerability in the Ultimate Member plugin allows attackers to inject scripts into WordPress sites.
March 11th, 2024Source

Why Wiz Is Pursuing Its 2nd Massive Funding Round in 2 Years
Just a year after becoming the world's most valuable venture-backed cybersecurity company, Wiz is back at it again.
March 11th, 2024Source

Internet — Security Issues — March 8th, 2024

Banning Ransom Payments: Calls Grow to 'Figure Out' Approach
How might banning ransomware victims from paying a ransom to their attacker work in practice?
March 8th, 2024Source or Source or Source or Source or Source

Change Healthcare registers pulse after crippling ransomware attack
Remaining services are expected to return in the coming weeks after $22M ALPHV ransom
March 8th, 2024Source

Chinese Cyberspies Target Tibetans via Watering Hole, Supply Chain Attacks
Chinese APT Evasive Panda compromises a software developer's supply chain to target Tibetans with malicious downloaders.
March 8th, 2024Source

CISA Outlines Efforts to Secure Open Source Software
Concluding a two-day OSS security summit, CISA details key actions to help improve open source security.
March 8th, 2024Source

Cisco patches Secure Client VPN flaw that could reveal authentication tokens (CVE-2024-20337)
Cisco has fixed two high-severity vulnerabilities affecting its Cisco Secure Client enterprise VPN and endpoint security solution, one of which (CVE-2024-20337) could be exploited by unauthenticated, remote attackers to grab users' valid SAML authentication token.
March 8th, 2024Source

Cybercrime crew Magnet Goblin bursts onto the scene exploiting Ivanti holes
Plus: CISA pulls plug on couple of systems feared compromised
March 8th, 2024Source

Defense Unicorns Raises $35 Million for National Security Software Solutions
Sapphire Ventures and Ansa Capital have invested $35 million in national security systems software startup Defense Unicorns.
March 8th, 2024Source

Identiv releases bitse.io 3.0, simplifying the deployment of IoT applications
Identiv launched bitse.io 3.0, the latest iteration of its global IoT connecting cloud platform. The updated platform offers advanced features designed to transform applications in supply chain management, brand protection, and customer engagement.
March 8th, 2024Source

In SOTU, Biden Calls for Ban on AI Voice Impersonations
US President Urges Congress to Harness AI While Protecting 'From Its Peril'
March 8th, 2024Source or Source or Source or Source or Source or Source

Is there a better way of protecting your digital life? [Q&A]
The nature of the modern world means that we all have lots of different accounts to manage various services.
March 8th, 2024Source

ISMG Editors: Our Pledge to You in a New Era of Journalism
In the latest weekly update, Information Security Media Group editors discussed the cyberattack at Change Healthcare that's sending shock waves through the U.S. healthcare sector, Palo Alto's strategic pivot and its far-reaching implications for the industry, and new developments in tech and journalism at ISMG.
March 8th, 2024Source or Source or Source or Source or Source

Microsoft falls victim to yet another deceitful exploit by cybercriminals in less than 2 months
Russian hackers gain access to Microsoft's source code and internal systems.
March 8th, 2024Source

Russian state-sponsored hackers compromised Microsoft source code repositories
The previously disclosed attack is worse than initially thought - and it's ongoing
March 8th, 2024Source

Microsoft says Kremlin-backed hackers accessed its source and internal systems
Midnight Blizzard is now using stolen secrets in follow-on attacks against customers.
March 8th, 2024Source

Microsoft Says Russian Gov Hackers Stole Source Code After Spying on Executive Emails
Microsoft says the Midnight Blizzard APT group may still be poking around its internal network after stealing source code, spying on emails.
March 8th, 2024Source

Microsoft says Russian hackers breached its systems, accessed source code
Microsoft says the Russian 'Midnight Blizzard' hacking group recently accessed some of its internal systems and source code repositories using authentication secrets stolen during a January cyberattack.
March 8th, 2024Source

Microsoft says Russian hackers stole source code after spying on its executives
Microsoft's nation-state security incident continues to be a headache for the company.
March 8th, 2024Source

NIST Cybersecurity Framework: A Cheat Sheet for Professionals
The US National Institute of Standards and Technology's framework defines federal policy, but it can be used by private enterprises, too. Here's what you need to know.
March 8th, 2024Source

Password-cracking botnet has taken over WordPress sites to attack using the visitor's browser
Researcher Denis Sinegubko concludes that 41,800 passwords are being attempted per-site.
March 8th, 2024Source

Quantum Attack Protection Added to HP Business PCs
An upgraded ESC security chip makes the firmware of several HP business PCs resilient to quantum computer attacks.
March 8th, 2024Source

Reach Security Raises $20M to Help Manage Cybersecurity Products
California startup banks $20 million Series A financing for technology to help businesses manage the maze of security tools and products.
March 8th, 2024Source

Russian spies keep hacking into Microsoft in 'ongoing attack,' company says
On Friday, Microsoft said Russian government hackers continue to break into its systems using information obtained during a hack last year. This time, the Russian hackers dubbed Midnight Blizzard have targeted Microsoft's source code and other internal systems, the company said.
March 8th, 2024Source

Russian State Hackers Penetrated Microsoft Code Repositories
A Russian state hack against Microsoft was more serious than initially supposed, Microsoft acknowledged in a Friday disclosure to federal regulators.
March 8th, 2024Source or Source or Source or Source or Source

Russian state-sponsored hackers keep trying to infiltrate Microsoft
They've targeted the company's source code and other internal systems.
March 8th, 2024Source

Some Change Healthcare IT Services Will Be Back by Mid-March
UnitedHealth Group expects certain key IT systems and services affected by the Feb. 21 cyberattack on its Change Healthcare unit to begin regaining functionality over the next week to 10 days. As of now, pharmacy services, such as electronic prescribing with claims submission and payment transmissions, have been restored.
March 8th, 2024Source or Source or Source

Spyware makers express concern after US sanctions spyware veteran
In announcing the sanctions, U.S. Treasury officials accused Dilian and Hamou of developing and selling spyware that was then used to target Americans, including U.S. government employees, as well as policy experts and journalists — actions that enabled human rights violations around the world.
March 8th, 2024Source

State AGs Send Letter to Meta Asking It to Take 'Immediate Action' on User Account Takeovers
A group of 40 state attorneys general have sent a letter to Meta expressing concern over Facebook and Instagram account takeovers.
March 8th, 2024Source

Swiss cheese security? Play ransomware gang milks government of 65,000 files
Classified docs, readable passwords, and thousands of personal information nabbed in Xplain breach
March 8th, 2024Source

UK Lawmakers Reject Privacy Limits for Bulk Data Collection
A last-ditch attempt by British lawmakers to amend a bill expanding electronic communication interception by the U.K. intelligence agencies failed despite concerns over pervasive surveillance.
March 8th, 2024Source or Source or Source or Source or Source

Unpatched Sceiner Smart Lock Vulnerabilities Allow Hackers to Open Doors
Multiple vulnerabilities in Sceiner firmware allow attackers to compromise smart locks and open doors.
March 8th, 2024Source

White House Advisory Team Backs Cybersecurity Tax Incentives
The federal government should extend tax incentives to critical infrastructure owners and operators as part of an effort to drive enhanced cybersecurity, a White House advisory board recommended Thursday.
March 8th, 2024Source or Source or Source or Source or Source

Internet — Security Issues — March 6th, 2024

Apple Fixes iOS Kernel Zero-Days Being Exploited in the Wild
Apple pushed out an emergency security update for two critical zero-day flaws that attackers are using to carry out memory corruption attacks on iPhone and iPad devices.
March 6th, 2024Source or Source or Source

Apple fixes two actively exploited iOS zero-days (CVE-2024-23225, CVE-2024-23296)
Apple has fixed two iOS zero-day vulnerabilities (CVE-2024-23225, CVE-2024-23296) exploited by attackers in the wild.
March 6th, 2024Source

BlackCat Ransomware Gang Suspected of Pulling Exit Scam
The BlackCat ransomware gang announces shutdown as an affiliate accuses theft of $22 million ransom payment.
March 6th, 2024Source

Canada's anti-money laundering agency offline after cyberattack
The Financial Transactions and Reports Analysis Centre of Canada (FINTRAC) has announced that a "cyber incident" forced it to take its corporate systems offline as a precaution.
March 6th, 2024Source

Capita says 2023 cyberattack costs a factor as it reports staggering £100M+ loss
Additional cuts announced, sparking fears of further layoffs
March 6th, 2024Source

Cisco Releases Open Source Backplane Traffic Visibility Tool for OT
Cisco has released an open source PoC tool named Badgerboard designed for improved backplane network visibility for OT.
March 6th, 2024Source or Source or Source or Source

Cloud Security Firm Sweet Security Raises $33 Million, 6 Months After Emerging From Stealth
Sweet Security announces a $33 million Series A funding round just six months after emerging from stealth with an initial $12 million seed funding.
March 6th, 2024Source

Cloudflare Boosts Cloud Connectivity with Nefeli Acquisition
Cloudflare purchased a multi-cloud networking startup founded by a former Cisco executive to enable better network and security management within the cloud.
March 6th, 2024Source or Source or Source or Source or Source or Source

Cloudflare Magic Cloud Networking simplifies security and management of public clouds
Cloudflare introduced Magic Cloud Networking, a simple, secure and scalable way for businesses to connect and secure their public cloud environments.
March 6th, 2024Source

Cyber Insights 2024: OT, ICS and IIoT
In an age of increasing geopolitical tensions caused by actual wars, and the threat of Chinese action against Taiwan, OT is a target that cannot be ignored by nation states.
March 6th, 2024Source

Deepwatch increases flexibility with its open security data architecture
Deepwatch introduced its open security data architecture, which provides customers with their choice of cloud and local data sources, including support for a broad range of Security Information and Event Management (SIEM) solutions as well as data lake, XDR, and MDR solutions.
March 6th, 2024Source

DPRK Hackers Breach South Korean Chipmakers, Steal Designs
South Korean intelligence has alluded to North Korean cyber actors conducting a series of attacks targeting the country's leading semiconductor manufacturing companies. Suspected nation-state actors accessed sensitive product designs and photos of production facilities - information that could help the regime modernize its chip-making capabilities for military applications.
March 6th, 2024Source or Source or Source or Source or Source

Duvel says it has "more than enough" beer after ransomware attack
Duvel Moortgat Brewery was hit by a ransomware attack late last night, bringing to a halt the beer production in the company's bottling facilities.
March 6th, 2024Source

EU looks to AI to battle cyber threats
The European Union is poised to use artificial intelligence and other tools to create a "cyber shield" protecting critical infrastructure and sectors from threats, officials said Wednesday.
March 6th, 2024Source

Europe Vows to Unify the Fight Against Cyberthreats
The European Parliament and the council of direct European national governments reached a political agreement Tuesday on a proposal that seeks to improve the trading bloc's ability to mitigate cyberthreats.
March 6th, 2024Source or Source or Source or Source or Source

False Positives: The Unwanted Side of Antivirus Protection
Have you ever been annoyed by your antivirus software telling you that a perfectly harmless file is infected with malware? That's what we call a false positive, and it can be a real pain in the ASCII. False Positives are not only annoying but can be downright destructive - Personally, while testing a known AV product once - it detected my NTUser.dat as a virus rendering the system unbootable.
March 6th, 2024Source

FBI: Critical infrastructure suffers spike in ransomware attacks
Jump in overall cybercrime reports, $60M-plus reportedly lost to extortionists alone, Feds reckon
March 6th, 2024Source

Fraud Alert versus Credit Freeze: Which One Should You Use?
Make it more difficult for hackers to open accounts in your name by setting up a fraud alert or freezing your credit.
March 6th, 2024Source

Fresh $100 Million Claroty Funding Brings Total to $735 Million
XIoT cybersecurity company Claroty has raised another $100 million at a reported valuation of $2.5 billion.
March 6th, 2024Source

George Kurtz: There's a Difference Between Price, Total Cost
CEO George Kurtz said Palo Alto Networks' strategy of offering free products won't neutralize CrowdStrike's advantage around total cost of ownership, thanks to superior architecture.
March 6th, 2024Source or Source or Source or Source or Source

Governments not keen on pushing citizen-facing AI services, for obvious reasons
As soon as public sector implements GenAI, someone will do their best to break it... or even flirt with it
March 6th, 2024Source

Hacked WordPress sites use visitors' browsers to hack other sites
Hackers are conducting widescale attacks on WordPress sites to inject scripts that force visitors' browsers to bruteforce passwords for other sites.
March 6th, 2024Source

Hackers impersonate U.S. government agencies in BEC attacks
A gang of hackers specialized in business email compromise (BEC) attacks and tracked as TA4903 has been impersonating various U.S. government entities to lure targets into opening malicious files carrying links to fake bidding processes.
March 6th, 2024Source

Hackers target Docker, Hadoop, Redis, Confluence with new Golang malware
Hackers are targeting misconfigured servers running Apache Hadoop YARN, Docker, Confluence, or Redis with new Golang-based malware that automates the discovery and compromise of the hosts.
March 6th, 2024Source

HHS Aiding Organizations Hit by Change Healthcare Cyberattack
US government lays out actions to assist healthcare providers following the highly disruptive Change Healthcare cyberattack.
March 6th, 2024Source

Lookout introduces SSE solution for mid-market enterprises
Lookout announced an edition of the Lookout Cloud Security Platform, the Company's Security Service Edge (SSE) solution, that specifically addresses the unique challenges and demands faced by mid-sized enterprises.
March 6th, 2024Source

Metomic provides data security tool for organizations that rely on Slack
Metomic announced Metomic for Slack Enterprise. By partnering with Slack, Metomic gives security teams full visibility and control of sensitive data sent across an organization's entire Slack workspace.
March 6th, 2024Source

Pathlock CAC helps SAP customers comply with regulations
Pathlock intorduced its SAP application and data security product suite, Cybersecurity Application Controls (CAC).
March 6th, 2024Source

Pentera Cloud empowers security teams to reduce exposure to cloud-native attacks
Pentera launched Pentera Cloud as part of its automated security validation platform to complement its renowned Pentera Core and Surface products.
March 6th, 2024Source

Privacy First and Competition
"Privacy First" is a simple, powerful idea: seeing as so many of today's technological problems are also privacy problems, why don't we fix privacy first?
March 6th, 2024Source

Ransomware group scams its partner out of a share of $22 million by faking an FBI takedown
Who said there is "honor among thieves?"
March 6th, 2024Source

Research exposes security, privacy and safety issues in female technology apps used to track fertility, monthly cycles
Experts at Royal Holloway, University of London, Newcastle University, University of London, and ETH Zurich have identified significant security, privacy, and safety issues surrounding FemTech, which can pose a potential threat to users.
March 6th, 2024Source

Sweet Security raises $33 million to identify and address cloud risks
Six months after coming out of stealth, Sweet Security is announcing a $33 million Series A funding round.
March 6th, 2024Source

What Are the Highest-Paying Cybersecurity Specialties?
In today's digital age, new career opportunities have emerged for digital protectors. Given the slope of success for the adversaries, these opportunities will continue to grow and pay more over time. They are not subject to the whims of the general economy or business budgetary trends and for those willing to dedicate their lives to safeguarding the digital corridors we all traverse, the rewards are both tangible and profound.
March 6th, 2024Source or Source or Source or Source or Source

Internet — Security Issues — March 4th, 2024

75+ Tech Checklists to Improve Efficiency
From malware response to cloud storage, every organization can benefit from a checklist to ensure effective and smooth operations.
March 4th, 2024Source

American Express credit cards exposed in third-party data breach
American Express is warning customers that credit cards were exposed in a third-party data breach after a merchant processor was hacked.
March 4th, 2024Source

Akamai App & API Protector enhancements detect and mitigate short DDoS attack bursts
Akamai announced significant additions to its flagship Akamai App & API Protector product, including advanced defenses against sophisticated application-layer distributed denial-of-service (DDoS) attacks.
March 4th, 2024Source

Are You as Competent as You Think You Are?
The Dunning-Kruger Effect and the Truth About How You Evaluate Your Career Skills
March 4th, 2024Source or Source or Source or Source or Source

Best Identity Theft Protection and Monitoring Services for 2024
If you suspect your identity may have been stolen, these identity theft protection services can help you.
March 4th, 2024Source

BlackCat ransomware turns off servers amid claim they stole $22 million ransom
The ALPHV/BlackCat ransomware gang has shut down its servers amid claims that they scammed the affiliate responsible for the attack on Optum, the operator of the Change Healthcare platform, of $22 million.
March 4th, 2024Source

Change Healthcare attack latest: ALPHV bags $22M in Bitcoin amid affiliate drama
No honor among thieves?
March 4th, 2024Source

Cyber security tips for remote work - ITSAP.10.116
When you work in the office, you benefit from the security measures that your organization has in place to protect its networks, systems, devices, and information from cyber threats. Working remotely provides flexibility and convenience. However, remote work can weaken your organization's security efforts and put you at risk if you don't take precautions.
March 4th, 2024Source

Cyolo PRO simplifies remote privileged access in OT environments
Cyolo launched Cyolo PRO (Privileged Remote Operations), a hybrid secure remote access solution for Operational Technology (OT).
March 4th, 2024Source

Darktrace partners with Xage Security to detect threats deep inside IT and OT systems
Darktrace and Xage Security announced a new partnership to help businesses prevent cyberattacks and insider threats in critical environments.
March 4th, 2024Source

Experts Warn of Risks in Memory-Safe Programming Overhauls
They Say Rewriting Software Could Overwhelm Firms and Introduce New Vulnerabilities
March 4th, 2024Source or Source or Source or Source or Source

Fake Ransomware Gang Admits It Made Up Epic Games Hack
Calls itself "professional fraudsters."
March 4th, 2024Source

FCC Employees Targeted in Sophisticated Phishing Attacks
Advanced phishing kit employs novel tactics in attack targeting cryptocurrency platforms and FCC employees.
March 4th, 2024Source

Flipper Zero Co-Founder Talks Lax Security And Amateur Hacking, Teases New Devices
The Flipper Zero, known for its use in widespread shenaniganry, is quite the little hacking device in all actuality. This pint-size hacking device is great for cloning hotel keys, opening garages (or Tesla charging ports), adjusting TVs you lost the remote for, and other hacker-type things, especially on penetration tests, which have recently caught the eye of the Canadian government.
March 4th, 2024Source

German Authorities Take Down 'Crimemarket' Cybercrime Website
With over 180,000 users, Crimemarket was a trading hub for narcotics, cybercrime tools, and crimeware guides.
March 4th, 2024Source

GitHub push protection now on by default for public repositories
GitHub push protection -- a security feature aimed at preventing secrets such as API keys or tokens getting accidentally leaked online -- is being switched on by default for all public repositories.
March 4th, 2024Source

Hackers steal Windows NTLM authentication hashes in phishing attacks
The hacking group known as TA577 has recently shifted tactics by using phishing emails to steal NT LAN Manager (NTLM) authentication hashes to perform account hijacks.
March 4th, 2024Source

Hikvision Patches High-Severity Vulnerability in Security Management System
A high-severity vulnerability in HikCentral Professional could lead to unauthorized access to certain URLs.
March 4th, 2024Source

How to see who viewed your LinkedIn profile
It takes just a few steps.
March 4th, 2024Source

How to stay anonymous on LinkedIn
Yes, people can see if you've viewed their profile on LinkedIn — and you can change that.
March 4th, 2024Source

How Traffic, State, and Organizational Data Help Fortify Your Network
Traffic data is the lifeblood of network security, representing the raw, unfiltered truth of what is happening on the network.
March 4th, 2024Source

Identiv ScrambleFactor provides privacy and security in restricted access environments
Identiv introduces ScrambleFactor, an addition to its high-security physical access control system (PACS) portfolio.
March 4th, 2024Source

Microsoft: Look to Supply Chains, Zero Trust for AI Security
Tech Giant Shares Major Threats, Potential Safeguards for Firms Using AI
March 4th, 2024Source or Source or Source or Source or Source or Source

Mobile-Driven Phishing Spoofs FCC, Cryptocurrency Giants
Researchers Say Hackers Used Fake Login Pages to Trick 100 Victims, Crypto Workers
March 4th, 2024Source or Source or Source or Source or Source

More than 100,000 GitHub repositories found spreading malicious packages
An effective way to compromise the software supply chain with developers' help
March 4th, 2024Source

North Korea hacks two South Korean chip firms to steal engineering data
The National Intelligence Service (NIS) in South Korea warns that North Korean hackers target domestic semiconductor manufacturers in cyber espionage attacks.
March 4th, 2024Source

Optum Offering Financial Aid to Some Providers Hit by Outage
But Hospital Lobby Group Contends Funding Is 'Onerous' and 'Exceedingly' Limited
March 4th, 2024Source or Source or Source or Source or Source

Pentagon Leaker Jack Teixeira Pleads Guilty Under a Deal That Calls for at Least 11 Years in Prison
The 22-year-old Air National Guard member admitted illegally collecting some of the nation's most sensitive secrets and sharing them with other users on Discord.
March 4th, 2024Source

Ransomware ban backers insist thugs must be cut off from payday
Increasingly clear number of permanent solutions is narrowing
March 4th, 2024Source

Ransomware Ring Hits Pharmaceutical Industry, Limiting Drug Access for Millions of Americans
ALPHV, a Russian-speaking ransomware gang, is thought to have disabled a network responsible for directing insurance claims to pharmacies.
March 4th, 2024Source

Remote Stuxnet-Style Attack Possible With Web-Based PLC Malware: Researchers
Researchers demonstrate that remote Stuxnet-style attacks are possible against many modern PLCs using web-based malware.
March 4th, 2024Source

Scientists put forth a smarter way to protect a smarter grid
There's a down side to "smart" devices: They can be hacked.
March 4th, 2024Source

ScreenConnect flaws exploited to drop new ToddlerShark malware
The North Korean APT hacking group Kimsuky is exploiting ScreenConnect flaws, particularly CVE-2024-1708 and CVE-2024-1709, to infect targets with a new malware variant dubbed ToddlerShark.
March 4th, 2024Source

Secure Your API With These 16 Practices With Apache APISIX (Part 2)
Last week, we listed 16 practices to help secure one's APIs and described how to implement them with Apache APISIX. This week, we will look at the remaining practices.
March 4th, 2024Source

Securing software repositories leads to better OSS security
Malicious software packages are found on public software repositories such as GitHub, PyPI and the npm registry seemingly every day.
March 4th, 2024Source

Silobreaker enhances threat intelligence platform with MITRE ATT&CK TTP detection capabilities
Silobreaker announced an integration with MITRE ATT&CK Matrix for Enterprise, Industrial Control Systems (ICS) and Mobile, to help organizations better understand threats associated with malware, threat actors and industries.
March 4th, 2024Source

The growing trend in cyberattacks against the aviation industry [Q&A]
Towards the end of last year the American Airlines pilot union was hit with a ransomware attack. This is just one of a growing number of attacks targeting the aviation sector.
March 4th, 2024Source

White House Recommends Memory-Safe Programming Languages and Security-by-Design
A new report promotes preventing cyberattacks by using memory-safe languages and the development of software safety standards.
March 4th, 2024Source

Zyxel Networks introduces affordable WiFi 7 solution for SMBs
Zyxel Networks has released its NWA130BE -- BE11000 WiFi 7 Triple-Radio NebulaFlex Access Point (AP).
March 4th, 2024Source

Internet — Security Issues — March 3rd, 2024

Georgia's Largest County Is Still Repairing Damage From January Cyberattack
Georgia's largest county is still repairing damage inflicted on its government offices by a cyberattack in January 2024.
March 3rd, 2024Source

Internet — Security Issues — March 2nd, 2024

Hackers target FCC, crypto firms in advanced Okta phishing attacks
A new phishing kit named CryptoChameleon is being used to target Federal Communications Commission (FCC) employees, using specially crafted single sign-on (SSO) pages for Okta that appear remarkably similar to the originals.
March 2nd, 2024Source

ISMG Editors: OpenAI's Response to The New York Times Case
Also: Addressing Scotland's Cybercrime Surge; NOC and SOC Convergence
March 2nd, 2024Source or Source or Source

Pentagon Leak Suspect Jack Teixeira Expected to Plead Guilty in Federal Case
The Air National Guardsman accused of leaking highly classified military documents on social media is expected to plead guilty in his federal case.
March 2nd, 2024Source

Internet — Security Issues — February 28th, 2024

A New Ransomware Gang Claims It Stole Source Code, Passwords And More In Epic Hack
When you get into the ransomware scene, one would think that you want to lay somewhat low while building up a decent reputation before going for the big fish. However, ransomware newcomer Mogilevich is coming out swinging with the claim that it has compromised Epic Games and made off with a good handful of data pertaining to the company.
February 28th, 2024Source

A ransomware group says it has stolen almost 200GB of data from Epic Games (updated)
The group has not posted any evidence supporting its claim
February 28th, 2024Source

Biden executive order aims to stop Russia and China from buying Americans' personal data
The bulk sale of geolocation, genomic, financial and health data will be off-limits to "countries of concern."
February 28th, 2024Source

Biden Executive Order Targets Bulk Data Transfers to China
New Order Tasks Department of Justice With Developing Data Transfer Protections
February 28th, 2024Source or Source or Source or Source or Source

Biden orders crackdown on selling Americans' personal data abroad
The broader issue of data harvesting remains an issue.
February 28th, 2024Source

Chinese Cyberspies Use New Malware in Ivanti VPN Attacks
Chinese threat actors target Ivanti VPN appliances with new malware designed to persist system upgrades.
February 28th, 2024Source

Cloud-focused malware campaigns on the increase
As commercial adoption of cloud technologies continues, cloud-focused malware campaigns have increased in both sophistication and number.
February 28th, 2024Source

Compliance Scorecard​ collaborates with ConnectSecure to automate asset governance
Compliance Scorecard​ and ConnectSecure have joined forces to automate asset governance.
February 28th, 2024Source

Cyber Insights 2024: APIs -- A Clear, Present, and Future Danger
The API attack surface is expanding and API vulnerabilities are growing. AI will help attackers find and exploit API vulnerabilities at scale.
February 28th, 2024Source

Down, Not Out: Russian Hacktivists Claiming DDoS Disruptions
Distributed Denial-of-Service Attacks Decline as Russia-Ukraine War Continues
February 28th, 2024Source or Source or Source or Source or Source

Enterprise workers want more transparency around cybersecurity
The nature of cybersecurity is such that much of the work goes on in the background. People notice when there's a problem but not when there isn't.
February 28th, 2024Source

Epic Games Allegedly Hacked - Targeted for Ransomware
Unconfirmed reports suggest that Epic Games, the company behind Fortnite, may be the target of a ransomware attack by a relatively unknown hacker group called Mogilvich. The group has allegedly leaked information on a darknet site, claiming to have 200GB of sensitive data, including email credentials, passwords, personal identification, financial information, source code, and more.
February 28th, 2024Source

Epic Games: "Zero evidence" we were hacked by Mogilevich gang
Epic Games said they found zero evidence of a cyberattack or data theft after the Mogilevich extortion group claimed to have breached the company's servers.
February 28th, 2024Source

European retailer Pepco loses €15.5 million in phishing (possibly BEC?) attack
Pepco Group has confirmed that its Hungarian business has been hit by a "sophisticated fraudulent phishing attack."
February 28th, 2024Source

Exabeam introduces new features to improve security analyst workflows
Exabeam announced two pioneering cybersecurity features, Threat Center and Exabeam Copilot, to its AI-driven Exabeam Security Operations Platform.
February 28th, 2024Source

Hackers Steal Personal Information From Pharma Giant Cencora
Pharmaceutical solutions provider Cencora discloses a cyberattack that resulted in personal information being stolen from its systems.
February 28th, 2024Source

Has the US Created the Wrong War Machine?
We Need Low-Cost, High-Volume Weapons Systems to Prevail in Future Conflicts
February 28th, 2024Source or Source or Source or Source or Source

HSCC publishes 5-year healthcare cybersecurity strategic plan
Developed over eighteen months by the Cybersecurity Working Group and government partners, the plan is a five-year health industry roadmap for addressing frequent and sophisticated cyber incidents aimed at the sector.
February 28th, 2024Source

IBM says their latest AI-enhanced storage platform can identify ransomware in under a minute
Fight fire with fire
February 28th, 2024Source

Is XDR Enough? The Hidden Gaps in Your Security Net
When evaluating XDR, consider its value based on its ability to reduce complexity and improve threat detection and response times.
February 28th, 2024Source

Japan warns of malicious PyPi packages created by North Korean hackers
Japan's Computer Security Incident Response Team (JPCERT/CC) is warning that the notorious North Korean hacking group Lazarus has uploaded four malicious PyPI packages to infect developers with malware.
February 28th, 2024Source

LockBit ransomware returns to attacks with new encryptors, servers
The LockBit ransomware gang is once again conducting attacks, using updated encryptors with ransom notes linking to new servers after last week's law enforcement disruption.
February 28th, 2024Source

ManageEngine partners with Check Point to help organizations tackle mobile threats
ManageEngine announced the integration between Endpoint Central, its flagship unified endpoint management solution, and Check Point's Harmony Mobile, a mobile threat defense solution, to help IT security teams automate the remediation of mobile threats.
February 28th, 2024Source

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, which could allow for arbitrary code execution. Successful exploitation of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
February 28th, 2024Source

New Ransomware Gang Claims Responsibility for Alleged Epic Games Hack
Epic Games says there is 'zero evidence right now' that Mogilevich is behind the supposed 189GB theft.
February 28th, 2024Source

NinjaOne and SentinelOne integration enhances risk mitigation and IT security
NinjaOne and SentinelOne launched a bi-directional product integration that redefines endpoint protection through the merging of IT operations and security.
February 28th, 2024Source

NIST updates Cybersecurity Framework with Version 2.0
Billed as the first major overhaul in a decade for the National Institute of Standards and Technology's foundational risk management approach, CSF 2.0 has new resources to help organizations better position themselves to mitigate cyber threats.
February 28th, 2024Source

Ransomware resurgence: Tackling the new generation of cyber threats
Sadly, there has never been a better phrase than 'survival of the fittest' to describe cyber criminal groups. They are constantly refining their tactics to cause greater disruption and earn even bigger profits. The ransomware ecosystem is a resilient and lucrative business model, and attacks are causing huge pain for organizations.
February 28th, 2024Source

Report Says Iranian Hackers Targeting Israeli Defense Sector
Hackers Are Leveraging Israel-Hamas War to Carry Out Attacks, Researcher Tells ISMG
February 28th, 2024Source or Source or Source or Source or Source

Rhysida ransomware wants $3.6 million for children's stolen data
The Rhysida ransomware gang has claimed the cyberattack on Lurie Children's Hospital in Chicago at the start of the month.
February 28th, 2024Source

State-sponsored hackers know enterprise VPN appliances inside out
Suspected Chinese state-sponsored hackers leveraging Ivanti Connect Secure VPN flaws to breach a variety of organizations have demonstrated "a nuanced understanding of the appliance", according to Mandiant incident responders and threat hunters.
February 28th, 2024Source

The Role of Penetration Testing in Strengthening Cyber Defenses
Penetration testing strengthens cyber defenses by simulating attacks, identifying vulnerabilities, and enhancing security measures.
February 28th, 2024Source

US Government Urges Cleanup of Routers Infected by Russia's APT28
The US government says Russia's APT28 group compromised Ubiquiti EdgeRouters to run cyberespionage operations worldwide.
February 28th, 2024Source

What EU Antitrust Probe Around Entra ID Means for Microsoft
Rivals Say Microsoft Restricts Competition Around Identity. Will Regulators Agree?
February 28th, 2024Source or Source or Source or Source

What's Next for Carbon Black Now That Broadcom Sale Is Dead?
A Carbon Black-Symantec Marriage Would Combine 2 Low-Growth Endpoint Security Teams
February 28th, 2024SourceSource or Source or Source or Source

White House Issues Executive Order on International Data Protection
A coming White House Executive Order seeks to protect personal information by preventing the mass transfer of Americans' sensitive data to countries of concern.
February 28th, 2024Source

Internet — Security Issues — February 27th, 2024

70% of Australians don't feel in control of their data as companies hide behind meaningless privacy terms
Australian consumers don't understand how companies—including data brokers—track, target and profile them. This is revealed in new research on consumer understanding of privacy terms, released by the non-profit Consumer Policy Research Centre and UNSW Sydney today.
February 27th, 2024Source

67,000 U-Haul Customers Impacted by Data Breach
U-Haul says customer information was compromised in a data breach involving a reservation tracking system.
February 27th, 2024Source

An Approach To Synthetic Transactions With Spring Microservices: Validating Features and Upgrades
Learn how synthetic transactions in fintech help in assuring quality and confidence, validating business functionality post major updates or new features.
February 27th, 2024Source

APT29 revamps its techniques to breach cloud environments
Russian threat actors APT29 are changing their techniques and expanding their targets to access cloud environments, members of the Five Eyes intelligence alliance have warned.
February 27th, 2024Source

Artificial Arms Race: What Can Automation and AI do to Advance Red Teams
The best Red Team engagements are a balanced mix of technology, tools and human operators.
February 27th, 2024Source

AU10TIX KYB solution validates info against global registries and jurisdictions
AU10TIX launched an Know Your Business (KYB) solution that enables companies to know exactly who they are doing business with and avoid potential financial and reputational losses.
February 27th, 2024Source

Bitwarden Secrets Manager integrates with Ansible Playbook
Bitwarden enhanced Bitwarden Secrets Manager by integrating with Ansible Playbook.
February 27th, 2024Source

Black Basta, Bl00dy Ransomware Exploiting Recent ScreenConnect Flaws
The Black Basta and Bl00dy ransomware gangs have started exploiting two vulnerabilities in ConnectWise ScreenConnect.
February 27th, 2024Source

Black Basta, Bl00dy ransomware gangs join ScreenConnect attacks
The Black Basta and Bl00dy ransomware gangs have joined widespread attacks targeting ScreenConnect servers unpatched against a maximum severity authentication bypass vulnerability.
February 27th, 2024Source

Canada's RCMP, Global Affairs Hit by Cyberattacks
Canadian authorities are actively investigating cyberattacks impacting the RCMP network and Global Affairs Canada.
February 27th, 2024Source

Cyber Insights 2024: Quantum and the Cryptopocalypse
Quantum computers are coming, and will defeat current PKE encryption. But this cryptopocalypse is not dependent upon quantum computers — it could happen through other means, at any time.
February 27th, 2024Source

Domains Once Owned by Major Firms Help Millions of Spam Emails Bypass Security
8,800 domains, many once owned by major companies, have been abused to get millions of emails past spam filters as part of SubdoMailing campaign.
February 27th, 2024Source

Elections in the Age of AI
CISOs Discuss AI Scams, Cyberthreats and Election Security Defenses
February 27th, 2024Source or Source or Source or Source or Source

Energy Department Invests $45 Million in 16 Projects to Improve Cybersecurity
The US government makes a $45 million investment in 16 projects to improve cybersecurity across the energy sector.
February 27th, 2024Source

FBI, CISA warn US hospitals of targeted BlackCat ransomware attacks
Today, the FBI, CISA, and the Department of Health and Human Services (HHS) warned U.S. healthcare organizations of targeted ALPHV/Blackcat ransomware attacks.
February 27th, 2024Source

Google Genie lets users generate AI outputs resembling video games
It's not 'Sora for video games,' but it's a step in that direction
February 27th, 2024Source

Groups Warn Health Sector of Change Healthcare Cyber Fallout
Some Researchers Confident ConnectWise ScreenConnect Flaw Was Exploited in Attack
February 27th, 2024Source

Hackers backed by Russia and China are infecting SOHO routers like yours, FBI warns
Six years on, routers remain a favorite post for concealing malicious activities.
February 27th, 2024Source

Hessen Consumer Center says systems encrypted by ransomware
The Hessen Consumer Center in Germany has been hit with a ransomware attack, causing IT systems to shut down and temporarily disrupting its availability.
February 27th, 2024Source

HSCC Issues Cyber 'Call to Action' Plan for Health Sector
5-Year Plan Details How to Raise the Bar on Health Ecosystem's Approach to Cyber
February 27th, 2024Source or Source or Source or Source or Source

Innovative blockchain technology balances privacy with regulatory compliance
In a recent study published in Blockchain: Research and Applications, researchers have developed a protocol called Privacy Pools that enhances privacy on blockchain transactions while complying with regulatory standards.
February 27th, 2024Source

Intel Unveils Next-Gen vPro Platform at MWC 2024
Empowering Business with AI-Driven Productivity and Security
February 27th, 2024Source

Legato Security Ensemble helps organizations prevent breaches
Legato Security launched Ensemble, a security operations platform that is poised to redefine how organizations detect, manage, and respond to threats.
February 27th, 2024Source

Moscow Military Hackers Used Microsoft Outlook Vulnerability
APT28 Used Hacked Ubiquiti Routers for Hashed Password Relay Attacks
February 27th, 2024Source or Source or Source or Source or Source

NIST Cybersecurity Framework 2.0 Officially Released
NIST releases Cybersecurity Framework 2.0, the first major update since the creation of the CSF a decade ago.
February 27th, 2024Source

NIST Releases First Update of its Cybersecurity Framework
After releasing the first version of its Cybersecurity Framework in 2014, the National Institute of Standards and Technology (NIST) has released its first update to the guidance document.
February 27th, 2024Source

NIST releases version 2.0 of cybersecurity framework
The National Institute of Standards and Technology (NIST) has updated the widely used Cybersecurity Framework (CSF), its landmark guidance document for reducing cybersecurity risk. The new 2.0 edition is designed for all audiences, industry sectors and organization types, from the smallest schools and nonprofits to the largest agencies and corporations—regardless of their degree of cybersecurity sophistication.
February 27th, 2024Source

NIST updates Cybersecurity Framework after a decade of lessons
The original was definitely getting a bit long in the tooth for modern challenges
February 27th, 2024Source

Notorious ransomware group launched cyberattack on UnitedHealth Group
A ransomware group known as Blackcat was responsible for launching a cyberattack last week at UnitedHealth Group that resulted in nationwide disruption of prescription orders, Reuters reported Feb. 26.
February 27th, 2024Source

Research introduces new approach for detecting deepfakes
Research published in the International Journal of Ad Hoc and Ubiquitous Computingintroduces a new approach to tackling the challenges posed by deepfake technology, which generates manipulated media content that closely resembles authentic footage.
February 27th, 2024Source

Russian hackers hijack Ubiquiti routers to launch stealthy attacks
Russian military hackers are using compromised Ubiquiti EdgeRouters to evade detection, the FBI says in a joint advisory issued with the NSA, the U.S. Cyber Command, and international partners.
February 27th, 2024Source

PKI Solutions introduces new version of PKI Spotlight
PKI Solutions introduced a new version of PKI Spotlight, a real-time monitoring and alerting system that provides live status, availability, configuration, and security of PKI environments (Microsoft PKI and others) and hardware security modules (HSMs).
February 27th, 2024Source

Top 10 Malware Q4 2023
The Cyber Threat Intelligence (CTI) team at the Multi-State Information Sharing and Analysis Center® (MS-ISAC®)
February 27th, 2024Source

US Gov Says Software Measurability is 'Hardest Problem to Solve'
White House calls for the "timely, complete, and consistent" publication of CVE and CWE data to help solve the security metrics problem.
February 27th, 2024Source

Using multimodal deep learning to detect malicious traffic with noisy labels
The success of a deep learning-based network intrusion detection systems (NIDS) relies on large-scale, labeled, realistic traffic. However, automated labeling of realistic traffic, such as by sand-box and rule-based approaches, is prone to errors, which in turn affects deep learning-based NIDS.
February 27th, 2024Source

VIAVI enhances Observer Sentry's exposure and vulnerability analysis
VIAVI Solutions announced the addition of traffic analysis capabilities to its Observer Sentry Software-as-a-Service-based threat exposure management solution.
February 27th, 2024Source

What Goes Around Comes Back Around, With Chatbots Too
Study Shows Correlation Between Polite Language, Culture and LLM Output
February 27th, 2024Source or Source or Source or Source or Source

White House urges developers to dump C and C++
Biden administration calls for developers to embrace memory-safe programing languages and move away from those that cause buffer overflows and other memory access vulnerabilities.
February 27th, 2024Source

White House: Use memory-safe programming languages to protect the nation
The White House is asking the technical community to switch to using memory-safe programming languages -- such as Rust, Python, Swift, C#, Java, and Go -- to prevent memory corruption vulnerabilities from entering the digital ecosystem.
February 27th, 2024Source

Internet — Security Issues — February 26th, 2024

7 Cyber Safety Tips to Outsmart Scammers
Welcome to the wild west of the digital world where cyber scammers lurk around every pixelated corner. Cybercrime isn't just a futuristic Hollywood plotline, it's a real threat that targets everyone—from wide-eyed kids to seasoned adults and wise grandparents.
February 26th, 2024Source

ALPHV/BlackCat responsible for Change Healthcare cyberattack
US government's bounty hasn't borne fruit as whack-a-mole game goes on
February 26th, 2024Source

API attacks put businesses at risk
Attacks targeting the business logic of APIs made up 27 percent of attacks in 2023, a growth of 10 percent since the previous year. Account takeover (ATO) attacks targeting APIs also increased from 35 percent in 2022 to 46 percent in 2023.
February 26th, 2024Source

Back from the dead: LockBit taunts cops, threatens to leak Trump docs
Officials have until March 2 to cough up or stolen data gets leaked
February 26th, 2024Source

Bitdefender Cryptomining Protection detects malicious cryptojacking attempts
Bitdefender announced Cryptomining Protection, a cryptomining management feature that allows users to both protect against malicious cryptojacking and manage their own legitimate cyptomining initiatives on their Windows PCs.
February 26th, 2024Source

Can AI boost clean energy efforts? Tech and policy leaders discuss solutions in Seattle
U.S. Energy Secretary Jennifer Granholm and Sen. Maria Cantwell met in Seattle on Friday with West Coast tech executives and leaders from national laboratories to strategize partnerships to more quickly and effectively harness artificial intelligence in the pursuit of clean energy.
February 26th, 2024Source

Critical Flaw in Popular 'Ultimate Member' WordPress Plugin
The vulnerability carries a CVSS severity score of 9.8/10 and affects web sites running the Ultimate Member WordPress membership plugin.
February 26th, 2024Source

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways
Tips for mitigating the risks associated with these cyberattacks, which include cloud-environment intrusions, are provided.
February 26th, 2024Source

Cyber Insights 2024: Artificial Intelligence
AI will allow attackers to improve their attacks, and defenders to improve their defense. Over time, little will change — but the battle will be more intense.
February 26th, 2024Source

Cybersecurity Training Not Sticking? How to Fix Risky Password Habits
Organizations recognize the cybersecurity risks posed by their end-users, so they invest in security and awareness training programs to help improve security and mitigate risks. However, cybersecurity training has its limitations, especially when it comes to changing end-users' behavior around passwords.
February 26th, 2024Source

Data watchdog tells off outsourcing giant for scanning staff biometrics despite 'power imbalance'
2,000 employees at 38 facilities had data processed 'unlawfully', ICO says
February 26th, 2024Source

DataVisor introduces fraud and risk solution for financial institutions
DataVisor launched a solution designed to both detect fraud and financial crimes more effectively and to uphold sponsor bank compliance in the face of evolving regulations for Banking-as-a-Service (BaaS) offerings.
February 26th, 2024Source

Is It Always Legal to Record Video and Audio in Your Home? Here's What You Need to Know
When do you have the right to record with a security device in your home, and when is it a privacy violation? These tips will help you stay safe and avoid potential legal problems.
February 26th, 2024Source

'Fake love' crypto scammers ensnare US victims
The "wine trader" wooed her online for months with his flirtatious smile and emoji-sprinkled texts. Then he went for the kill, defrauding the Philadelphia-based tech professional out of $450,000 in a cryptocurrency romance scam.
February 26th, 2024Source

Feds hack LockBit, LockBit springs back. Now what?
The busted ransomware gang leader returns with a promise of vengeance
February 26th, 2024Source

From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements
Open source is a great way to test the waters and define requirements. But when looking at putting a platform into production, an enterprise-ready solution will ensure you can keep up with business demands.
February 26th, 2024Source

Groups Warn Health Sector of Change Healthcare Cyber Fallout
Some Researchers Confident ConnectWise ScreenConnect Flaw Was Exploited in Attack
February 26th, 2024Source or Source or Source or Source

Hackers exploit 14-year-old CMS editor on govt, edu sites for SEO poisoning
Threat actors are exploiting a CMS editor discontinued 14 years ago to compromise education and government entities worldwide to poison search results with malicious sites or scams.
February 26th, 2024Source

How the use of mobile devices is changing the cybersecurity landscape [Q&A]
As consumers and businesses undergo a sea change shift towards mobile interfaces, embracing everything from retail to human resources management, the landscape of mobile security is experiencing a parallel transformation.
February 26th, 2024Source

Intel Edge Platform simplifies development and management of edge AI apps
Intel announced its new Edge Platform, a modular, open software platform enabling enterprises to develop, deploy, run, secure, and manage edge and AI applications at scale with cloud-like simplicity.
February 26th, 2024Source

Joint cyber security advisory warns that Russian state actors are adapting their tactics to access cloud infrastructure
The Communications Security Establishment (CSE) and its Canadian Centre for Cyber Security (Cyber Centre) joined their Five Eyes cyber security partners in issuing a joint advisory detailing tactics used by Russian Foreign Intelligence Service (SVR) actors to gain initial cloud access
February 26th, 2024Source

LoanDepot Ransomware Attack Exposed 16.9 Million Individuals
Lending firm LoanDepot said the personal information of 16.9 million people was stolen in a ransomware attack in early January.
February 26th, 2024Source or Source

LockBit Back Online as Ransomware Gang Continues to Clash with Law Enforcement
LockBit is now running from backup servers and has a new Dark Web presence after their site's recent takedown by the FBI and international partners.
February 26th, 2024Source

LockBit leak site is back online
LockBitSupp, the individual running the LockBit ransomware-as-a-service operation, has made good on one promise: the LockBit leak site is back online on backup domains, with lists of victims expected to be unveiled in the coming days.
February 26th, 2024Source or Source

McAfee Social Privacy Manager helps users keep their posts and personal information more private
McAfee announced the launch of Social Privacy Manager to its McAfee+ product line-up.
February 26th, 2024Source

Nancy Pelosi Creates a Buzz by Buying up Shares in the Cyber Security Company Palo Alto Networks (PANW)
Nancy Pelosi, a household name on the hill and, inarguably, one of the best asset managers in town with a stellar stock-picking record, has set the tongues wagging across the financial community today after disclosing a material position in the cyber security company, Palo Alto Networks.
February 26th, 2024Source

Navigating the 2024 IT landscape: The essential role of governance
This year, IT teams across the globe are facing a tech landscape that's undergoing a major transition. Cybersecurity has emerged as a paramount concern, with escalating threats and sophisticated cyber-attacks posing significant risks to business operations.
February 26th, 2024Source

NetSTAR PhishCompass combats phishing threats
NetSTAR announced an advancement in phish detection technology with the introduction of PhishCompass.
February 26th, 2024Source

Palo Alto Networks empowers customers with integrated private 5G solutions
Palo Alto Networks announced end-to-end private 5G security solutions and services in collaboration with leading Private 5G partners.
February 26th, 2024Source

Pikabot returns with new tricks up its sleeve
After a short hiatus, Pikabot is back, with significant updates to its capabilities and components and a new delivery campaign.
February 26th, 2024Source

Ransomware attack blamed for Change Healthcare outage stalling US prescriptions
An ongoing cyberattack at U.S. health tech giant Change Healthcare that sparked outages and disruption to hospitals and pharmacies across the U.S. for the past week was caused by ransomware, TechCrunch has learned.
February 26th, 2024Source

Ransomware Operation LockBit Relaunches Dark Web Leak Site
After Operation Cronos, LockBit Leader LockBitSupp Vows to Continue Hacking
February 26th, 2024Source or Source or Source or Source or Source

Researchers say easy-to-exploit security bugs in ConnectWise remote-access software now under mass attack
Security researchers say a pair of easy-to-exploit flaws in a popular remote-access tool used by more than a million companies around the world are now being mass exploited, with hackers abusing the vulnerabilities to deploy ransomware and steal sensitive data.
February 26th, 2024Source

Russian Cyberspies Targeting Cloud Infrastructure via Dormant Accounts
US government and allies expose TTPs used by notorious Russian hacking teams and warn of the targeting of dormant cloud accounts.
February 26th, 2024Source

Russian hackers shift to cloud attacks, US and allies warn
Members of the Five Eyes (FVEY) intelligence alliance warned today that APT29 Russian Foreign Intelligence Service (SVR) hackers are now switching to attacks targeting their victims' cloud services.
February 26th, 2024Source

Russian Threat Actor APT29 Pivots to the Cloud for Espionage
Five Eyes Cyber Agencies Say Kremlin Hackers Are Following Victims to the Cloud
February 26th, 2024Source or Source or Source or Source or Source

Privacy Watchdog Cracks Down on Biometric Employee Tracking
Leisure Center Operators Ordered to Stop Using Facial and Fingerprint Recognition
February 26th, 2024Source or Source or Source or Source or Source

ScreenConnect flaws exploited to deliver all kinds of malware (CVE-2024-1709, CVE-2024-1708)
The recently patched vulnerabilities (CVE-2024-1709, CVE-2024-1708) in ConnectWise ScreenConnect software are being exploited by numerous attackers to deliver a variety of malicious payloads.
February 26th, 2024Source

State-Sponsored Group Blamed for Change Healthcare Breach
UnitedHealth Group is blaming a state-sponsored threat actor for a disruptive cyberattack on its subsidiary Change Healthcare.
February 26th, 2024Source

The Art of Ethical Hacking: Securing Systems in the Digital Age
Ethical hacking utilizes techniques for positive purposes, safeguarding digital systems from cyber threats by identifying vulnerabilities before malicious hackers.
February 26th, 2024Source

Web Application Security: The Ultimate Guide to Coding Best Practices
Explore best practices and core considerations for writing secure code across web applications in this all-encompassing guide.
February 26th, 2024Source

White House urges devs to switch to memory-safe programming languages
The White House Office of the National Cyber Director (ONCD) urged tech companies today to switch to memory-safe programming languages, such as Rust, to improve software security by reducing the number of memory safety vulnerabilities.
February 26th, 2024Source or Watch Video

Internet — Security Issues — February 25th, 2024

LockBit ransomware returns, restores servers after police disruption
The LockBit gang is relaunching its ransomware operation on a new infrastructure less than a week after law enforcement hacked their servers, and is threatening to focus more of their attacks on the government sector.
February 25th, 2024Source

NBA Top Shot NFT scam promoted by hacked ESPN reporter's X account
"There is NO Free Airdrop happening on NBA Top Shot at this time."
February 25th, 2024Source

Ransomware Operation LockBit Relaunches Dark Web Leak Site
After Operation Cronos, LockBit Leader LockBitSupp Vows to Continue Hacking
February 25th, 2024Source or Source or Source or Source or Source

RCMP investigating cyber attack as its website remains down
The Royal Canadian Mounted Police (RCMP), Canada's national police force has disclosed that it recently faced a cyber attack targeting its networks.
February 25th, 2024Source

Security is hard because it has to be right all the time? Yeah, like everything else
It takes only one bottleneck or single point of failure to ruin your week
February 25th, 2024Source

Internet — Security Issues — February 24th, 2024

How to remove your address from the Internet
It's 2024 and "doxxing" has become a daily occurrence. Our own personal data is out there on the Internet — collected by apps and services, bought out by data brokers, and re-sold to the highest bidder.
February 24th, 2024Source

Internet — Security Issues — February 23rd, 2024

40 Countries Vow Not to Pay Ransomware Hackers
In a gathering of 48 countries for the third annual International Counter Ransomware Initiative summit, the U.S. and allies are pledging to not pay ransomware attacks leveraged against their individual countries.
February 23rd, 2024Source

230k Individuals Impacted by Data Breach at Australian Telco Tangerine
Tangerine Telecom says attackers stole the personal information of 230,000 individuals from a legacy customer database.
February 23rd, 2024Source

A type of cyberattack that could set your smartphone on fire using its wireless charger
A team of security experts at the University of Florida working with security audit company CertiK has found that a certain class of cyberattacks could cause a smartphone to catch fire via its wireless charger.
February 23rd, 2024Source

A Vulnerability in Apache OFBiz Could Allow for Remote Code Execution
A vulnerability has been discovered in the Apache OFBiz, which could allow for remote code execution. Apache OFBiz is an open source product for the automation of enterprise processes. It includes framework components and business applications for ERP, CRM, E-Business/E-Commerce, Supply Chain Management and Manufacturing Resource Planning. Successful exploitation could allow for remote code execution in the context of the Server.
February 23rd, 2024Source

AI Will Lead to Increase in Ransomware
With the growth of AI-based technologies, cybersecurity experts are warning about the upcoming increase in attack attempts and complexity, as cybercriminals increase their use of available tools.
February 23rd, 2024Source

Apple Shortcuts Vulnerability Exposes Sensitive Information
High-severity vulnerability in Apple Shortcuts could lead to sensitive information leak without user's knowledge.
February 23rd, 2024Source

Attackers Rush to Exploit ScreenConnect Vulnerabilities
Ransomware, Info Stealers, Backdoors and Cryptojacking
February 23rd, 2024Source or Source

Avast ordered to pay $16.5 million for misuse of user data
The Federal Trade Commission will require software provider Avast to pay $16.5 million and prohibit the company from selling or licensing any web browsing data for advertising purposes to settle charges that the company and its subsidiaries sold such information to third parties after promising that its products would protect consumers from online tracking.
February 23rd, 2024Source or Source

'Azure AI Content Safety' Service Targets Developer Online Environments
Microsoft shipped an Azure AI Content Safety service to help AI developers build safer online environments.
February 23rd, 2024Source

Binance Restricts 85 LockBit Crypto Wallets
Authorities Uncover 30,000 LockBit Bitcoin Addresses
February 23rd, 2024Source or Source or Source or Source or Source

Change Healthcare Cyber Outage Disrupts Firms Nationwide
HHS Issues Special Alert Urging Providers and Contractors to 'Stay Vigilant'
February 23rd, 2024Source or Source

Change Healthcare Outage Hits Military Pharmacies Worldwide
ConnectWise Denies Speculation That Hack Involved the ScreenConnect Flaw Exploit
February 23rd, 2024Source

CISA Offers Free 'Logging Made Easy' Tool for Diagnosing Threats
LME is a bundle of free and open source software for organizations lacking a security operations center or security information and event management (SIEM) solution, as well as lacking the security knowledge and expertise to set up an intrusion detection system, per its GitHub description.
February 23rd, 2024Source

Defending against distributed denial of service (DDoS) attacks -- ITSM.80.110
As technology evolves, distributed denial of service (DDoS ) attacks are becoming more sophisticated and widespread. These attacks, commonly used by cybercriminals, can cause significant financial, operational, and reputational damage to organizations worldwide. Regardless of the type of DDoS attack, the main goal is always to overwhelm and incapacitate targeted servers, services, or networks by flooding them with malicious traffic from compromised devices or networks.
February 23rd, 2024Source

Enabling Compliance and Security in AI-Driven, Low-Code/No-Code Development
Low-code/no-code development offers a lot of opportunities for companies across sectors, but it can also bring new security risks and compliance concerns.
February 23rd, 2024Source

Exploring the Nexus Between DevSecOps and Cybersecurity
Explore the vital connection between development, security practices, and the evolving landscape of cybersecurity here in this blog!
February 23rd, 2024Source

Hackers are exploiting ConnectWise flaws to deploy LockBit ransomware, security experts warn
Security experts are warning that a pair of high-risk flaws in a popular remote access tool are being exploited by hackers to deploy LockBit ransomware — days after authorities announced that they had disrupted the notorious Russia-linked cybercrime gang.
February 23rd, 2024Source

Hackers are hunting celebs. Digital IDs can help — but come with caveats
Decentralised digital identities offer both promise and peril
February 23rd, 2024Source

HHS OCR Tells Congress It Needs More Funding for HIPAA Work
Breaches and Complaints Continue to Soar as Regulatory Duties Increase
February 23rd, 2024Source or Source or Source

In Other News: Spyware Vendor Shutdown, Freenom-Meta Settlement, 232 Threat Groups
Noteworthy stories that might have slipped under the radar: Spyware vendor Variston is reportedly shutting down, Crowdstrike tracks 232 threat actors, Meta and Freenom reach settlement.
February 23rd, 2024Source

Insomniac Games alerts employees hit by ransomware data breach
Sony subsidiary Insomniac Games is sending data breach notification letters to employees whose personal information was stolen and leaked online following a Rhysida ransomware attack in November.
February 23rd, 2024Source

ISMG Editors: The 'New Frontier' of AI and Identity Security
Identity Security Expert Jeremy Grant Discusses Challenges, Innovations and Trends
February 23rd, 2024Source or Source or Source or Source or Source

LockBit ransomware gang has over $110 million in unspent bitcoin
The LockBit ransomware gang received more than $125 million in ransom payments over the past 18 months, according to the analysis of hundreds of cryptocurrency wallets associated with the operation.
February 23rd, 2024Source

Microsoft and OpenAI Collaborate on AI Security, Block State-Sponsored Attackers
Microsoft and OpenAI have shut down five state-sponsored hacking groups that were using OpenAI's large language models (LLMs) "in support of malicious cyber activities," per announcements this week.
February 23rd, 2024Source

Microsoft Defender for Cloud Adds Agentless Virtual Machine Malware Scanning
Microsoft announced on Thursday that it has added agentless malware scanning for servers hosting virtual machines.
February 23rd, 2024Source

Microsoft Disables App Installer Feature Amid Security Concerns
Microsoft on Thursday took steps to safeguard users by disabling the App Installer feature in Windows 10, following the discovery that threat actors were exploiting it to spread malware.
February 23rd, 2024Source

Microsoft Releases Red Teaming Tool for Generative AI
Microsoft releases PyRIT red teaming tool to help identify risks in generative AI through automation.
February 23rd, 2024Source

Microsoft Secure Future Initiative Aims To Address Cybersecurity Problems
Microsoft on Thursday announced a Secure Future Initiative (SFI) approach to dealing with cybersecurity threats.
February 23rd, 2024Source

No Big Reveal: Cops Don't Unmask LockBit's LockBitSupp
After Teasing 'Who Is LockBitSupp,' Cops Say He's 'Engaged With Law Enforcement'
February 23rd, 2024Source or Source or Source

Ofcom Unprepared to Implement UK Online Safety Bill
UK Parliamentary Committee Says the Agency Is Not Likely to Meet the 2025 Deadline
February 23rd, 2024Source or Source

" target="new" class="RM1">Source

Open-Source Leadership to the European Commission: CRA Rules Pose Tech and Economic Risks to EU
New cybersecurity rules for digital products proposed by the European Commission pose "unnecessary economic and technological risks to the European Union," according to a group of 12 open-source software leadership organizations.
February 23rd, 2024Source

Post-LockBit, How Will the Ransomware Ecosystem Evolve?
With Over $1 Billion in Annual Proceeds, Don't Expect Attackers to Give Up the Life
February 23rd, 2024Source or Source or Source or Source or Source

'SlashAndGrab' ScreenConnect Vulnerability Widely Exploited for Malware Delivery
ConnectWise ScreenConnect vulnerability tracked as CVE-2024-1709 and SlashAndGrab exploited to deliver ransomware and other malware.
February 23rd, 2024Source

Spyware leak offers 'first-of-its-kind' look inside Chinese government hacking efforts
Documents show Chinese hacking firm I-Soon hacked governments around the world
February 23rd, 2024Source

Thanks FedEx, This is Why we Keep Getting Phished
I've been getting a lot of those "your parcel couldn't be delivered" phishing attacks lately and if you're a human with a phone, you probably have been too. Just as a brief reminder, they look like this:
February 23rd, 2024Source

The impact of AI on cybersecurity
The market for AI in cybersecurity is expected to reach more than $133 billion by 2030 according to a new report from Techopedia.
February 23rd, 2024Source

Tips To Help GitHub Admins Prepare A Company For SOC 2 And ISO 27001 Audits
Source code protection is highly important nowadays, and when your data is well protected according to the best standards, it becomes an absolute must.
February 23rd, 2024Source

Toward Better Patching — A New Approach with a Dose of AI
Use of AI to cut through the noise and confusion of the current vulnerability prioritization approaches suggests an exciting future for AI-assisted operations to vulnerability triaging.
February 23rd, 2024Source

UnitedHealth subsidiary Optum hack linked to BlackCat ransomware
A cyberattack on UnitedHealth Group subsidiary Optum that led to an ongoing outage impacting the Change Healthcare payment exchange platform was linked to the BlackCat ransomware group by sources familiar with the investigation.
February 23rd, 2024Source

US FTC Imposes Strict Reporting Mandates for Global Tel*Link
New Reporting Measures Follow Data Breach Affecting Prison Communications Provider
February 23rd, 2024Source or Source or Source or Source

Watch Now: Cloudy With a Chance of Threats: The Active Threat Landscape in the Cloud
Join the webinar to learn about active threats targeting common cloud deployments and what security teams can do to mitigate them.
February 23rd, 2024Source

Internet — Security Issues — February 21st, 2024

Alarming Security Report Warns Of An Unprecedented Surge In Ransomware Attacks
Over the past couple of years, the ransomware industry has exploded leading to millions in lost dollars to cybercriminals extorting businesses to regain access and control of their private data. It was thought to have reached a head when the Biden Administration sought to crack down on the threat at the International Counter Ransomware Summit in 2021.
February 21st, 2024Source

Apple Adds Post-Quantum Encryption to iMessage
Apple unveils PQ3, a new post-quantum cryptographic protocol for iMessage designed to protect communications against quantum computing attacks.
February 21st, 2024Source

Apple is giving iMessage a massive security update
Security so good it rivals the government...allegedly.
February 21st, 2024Source

Beyond Identity Device360 identifies device security risks
Beyond Identity released a new Device360 solution for continuous device security posture management.
February 21st, 2024Source

Biden asks Coast Guard to create an infosec port in a stormy sea of cyber threats
Oh hear us when we cry to thee for those in peril on the sea
February 21st, 2024Source

Biden is boosting cybersecurity at US ports, where online attacks can be more ravaging than storms
President Joe Biden on Wednesday signed an executive order and created a federal rule aimed at better securing the nation's ports from potential cyberattacks.
February 21st, 2024Source

Biden to Sign Executive Order Raising Maritime Cybersecurity
US Coast Guard Will Publish Proposed Rule Establishing Cybersecurity Minimums
February 21st, 2024Source or Source or Source

Breach at Aussie Telecom Tangerine Affects 232,000 Customers
Customer Accounts Were Secured by MFA, But Contractor's Credentials Exposed Data
February 21st, 2024Source or Source or Source or Source or Source

Check Point launches Quantum Force, series of AI-powered firewalls
Check Point introduces Check Point Quantum Force series: a lineup of ten firewalls designed to meet and exceed the stringent security demands of enterprise data centers, network perimeters, campuses, and businesses of all dimensions.
February 21st, 2024Source

ConnectWise Confirms ScreenConnect Flaw Under Active Exploitation
Security experts describe exploitation of the CVSS 10/10 flaw as "trivial and embarrassingly easy."
February 21st, 2024Source

Control Systems Firm PSI Struggles to Recover From Ransomware Attack
German control system solutions provider PSI Software says it is still recovering from a ransomware attack.
February 21st, 2024Source

Cyber Insights 2024: Ransomware
Ransomware insights: When ransomware first appeared, the term became associated with encrypting data. This is a misconception.
February 21st, 2024Source

Cyberattacks follow businesses to the cloud
Cloud intrusions increased by 75 percent overall last year as adversaries set their sights on the cloud through the use of valid credentials.
February 21st, 2024Source

Cybercriminals use identities to target enterprises
A new report from IBM X-Force Threat Intelligence highlights an emerging global identity crisis as cybercriminals double down on exploiting user identities to compromise enterprises worldwide.
February 21st, 2024Source

Cybersecurity and data protection: Does ChatGPT really make a difference?
An analysis published in the Journal for International Business and Entrepreneurship Development has looked at the various approaches to cybersecurity and data protection taken by key global players, namely the European Union (EU), the United States of America (U.S.), and China.
February 21st, 2024Source

Cybersecurity for satellites is a growing challenge as threats to space-based infrastructure grow
In today's interconnected world, space technology forms the backbone of our global communication, navigation and security systems. Satellites orbiting Earth are pivotal for everything from GPS navigation to international banking transactions, making them indispensable assets in our daily lives and in global infrastructure.
February 21st, 2024Source

Discord took no action against server that coordinated costly Mastodon spam attacks
Over the weekend, hackers targeted federated social networks like Mastodon to carry out ongoing spam attacks that were organized on Discord, and conducted using Discord applications. But Discord has yet to remove the server where the attacks are facilitated, and Mastodon community leaders have been unable to reach anyone at the company.
February 21st, 2024Source

Diversifying Defenses: FjordPhantom Malware Shows Importance of a Multi-Pronged Approach
Security teams need to combine the angles of client-side and server-side detection in order to have the best chance of mitigating the risk of advanced mobile malware.
February 21st, 2024Source

Executive Order on Port Cybersecurity Points to IT/OT Threat Posed by Chinese Cranes
A new Biden executive order to boost the cybersecurity of US ports highlights the risks associated with the use of Chinese cranes.
February 21st, 2024Source

Hack at Services Firm Hits 2.4 Million Eye Doctor Patients
As Vendor Breaches Surge, Medical Practices Need 20/20 Visibility on Third Parties
February 21st, 2024Source or Source or Source or Source

Hackers abuse Google Cloud Run in massive banking trojan campaign
Security researchers are warning of hackers abusing the Google Cloud Run service to distribute massive volumes of banking trojans like Astaroth, Mekotio, and Ousaban.
February 21st, 2024Source

How do I remove malware from my PC?
Removing malware from your PC could be simple - or not. Here's everything you need to know.
February 21st, 2024Source

Joomla CMS Patches Critical XSS Vulnerabilities
Millions of Websites Potentially at Risk
February 21st, 2024Source or Source

Law Enforcement Locks Down LockBit Ransomware Group, Arrests 2
The world's biggest ransomware syndicate has swiped more than $120 million from victims like Boeing and the United Kingdom's Royal Mail.
February 21st, 2024Source

LockBit leaks expose nearly 200 affiliates and bespoke data-stealing malware
Operation Cronos's 'partners' continue to trickle the criminal empire's secrets
February 21st, 2024Source

Microsoft expands free logging capabilities after May breach
Microsoft has expanded free logging capabilities for all Purview Audit standard customers, including U.S. federal agencies, six months after disclosing that Chinese hackers stole U.S. government emails undetected in an Exchange Online breach between May and June 2023.
February 21st, 2024Source

Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution.
February 21st, 2024Source

New SSH-Snake malware steals SSH keys to spread across the network
A threat actor is using an open-source network mapping tool named SSH-Snake to look for private keys undetected and move laterally on the victim infrastructure.
February 21st, 2024Source

NSA Announces Retirement of Cybersecurity Director Rob Joyce
NSA says Rob Joyce is retiring as cybersecurity director and will be replaced by David Luber, the current deputy director of cybersecurity.
February 21st, 2024Source

PAM Provider Delinea Buys Fastpath
Acquisition Will Allow Delinea to Detect Overprivileged Access, Company Says
February 21st, 2024Source or Source or Source or Source or Source

Published CVEs predicted to increase by 25 percent in 2024
The total number of common vulnerabilities and exposures (CVEs) is expected to increase by 25 percent in 2024 to 34,888 vulnerabilities, or roughly 2,900 per month.
February 21st, 2024Source

Redis Servers Targeted With New 'Migo' Malware
Attackers weaken Redis instances to deploy the new Migo malware and install a rootkit and cryptominers.
February 21st, 2024Source

Researchers Devise 'VoltSchemer' Attacks Targeting Wireless Chargers
Researchers document VoltSchemer attacks that manipulate power voltage to take over commercial wireless chargers.
February 21st, 2024Source

Researchers warn high-risk ConnectWise flaw under attack is 'embarrassingly easy' to exploit
'I can't sugarcoat it — this shit is bad,' said Huntress' CEO
February 21st, 2024Source

Russia Announces Arrest of Medibank Hacker Tied to REvil
3 Suspects Charged With Using Sugar Ransomware, Phishing Attacks Against Russians
February 21st, 2024Source or Source or Source or Source or Source

Searchlight Cyber integrates MITRE ATT&CK Mapping into DarkIQ for dark web monitoring
Searchlight Cyber has integrated the MITRE ATT&CK Enterprise Framework into its dark web monitoring solution, DarkIQ. Aligning actionable dark web intelligence with a universally understood cybersecurity framework empowers all cybersecurity teams, irrespective of size, to contextualize ongoing threats and respond with recommended mitigations -- further enhancing the value of dark web monitoring for identifying cyberattacks.
February 21st, 2024Source

Should IT and Security Teams Play a Role in Crisis Communications?
Australian IT and security teams should play key roles in communications during outages and cyber attacks; they also need to be prepared to act when such a tech-related crisis occurs.
February 21st, 2024Source

Tech Moves: Expedia taps execs to run new divisions; Bumble hires Microsoft vet as CTO
Alfonso Paredes, who joined Expedia 14 years ago, was named president of Private Label Solutions. Paredes, based in London, was most recently a senior vice president for Expedia Partner Solutions.
February 21st, 2024Source

The Deep Tech revolution -- Part 5: Hackathons
More often than not, hackers tend to get a bad reputation or, at the very least, a controversial one. In pop culture especially, they are usually portrayed either as cyber-criminals attacking organizations for personal gain or, at the very opposite end of the spectrum, using their skills for something positive.
February 21st, 2024Source

US health tech giant Change Healthcare hit by cyberattack
U.S. healthcare technology giant Change Healthcare has confirmed a cyberattack on its systems. In a brief statement Wednesday, the company said it was "experiencing a network interruption related to a cyber security issue."
February 21st, 2024Source

US offers $15 million bounty for info on LockBit ransomware gang
The U.S. State Department is now also offering rewards of up to $15 million to anyone who can provide information about LockBit ransomware gang members and their associates.
February 21st, 2024Source

Vastaamo Hacker Disappears Amid Ongoing Trial
Aleksanteri Kivimaki Vanished After the Court Ordered His Reconfinement
February 21st, 2024Source

VMware pushes admins to uninstall vulnerable, deprecated vSphere plugin (CVE-2024-22245, CVE-2024-22250)
VMware Enhanced Authentication Plug-in (EAP), a plugin for VMware vSphere, has two vulnerabilities (CVE-2024-22245, CVE-2024-22250) that could be exploited by attackers to mount authentication relay and session hijack attacks.
February 21st, 2024Source

Internet — Security Issues — February 19th, 2024

ALPHV gang claims it's the attacker that broke into Prudential Financial, LoanDepot
Ransomware group continues to exploit US regulatory requirements to its advantage
February 19th, 2024Source

Arcitecta enhances Mediaflux Livewire to optimize data movement
Arcitecta announced significant enhancements to its Mediaflux Livewire offering that address the challenges of transmitting data over low-bandwidth and unreliable network connections.
February 19th, 2024Source

Cactus ransomware claim to steal 1.5TB of Schneider Electric data
The Cactus ransomware gang claims they stole 1.5TB of data from Schneider Electric after breaching the company's network last month.
February 19th, 2024Source

Cybersecurity success -- elevate your defense against cyber threats
As cybercrime continues to increase, organizations must consider actions to improve their cyber security and cyber resilience. There are constantly new ransomware and data breach headlines hitting the news, and, according to research, a company falls victim to a cyberattack every 39 seconds.
February 19th, 2024Source

Do Spencer's Vibrators Have Malware on Them? An Investigation
We tested the vibrator that a Spencer's customer claims almost gave their computer malware.
February 19th, 2024Source

Do you need antivirus on Linux?
If you've been a Windows user for years, then you are well aware of the need for antivirus software. It's a given. But does the same hold true for the open-source operating system?
February 19th, 2024Source

How to protect your digital accounts from hackers
Social media, email, retailers, service providers, insurance. For most people, the list of important online accounts is long. Here's how to keep them safe -- and regain control when you're hacked.
February 19th, 2024Source

Improving cloud security model for web applications using hybrid encryption techniques
Research published in the International Journal of Internet Technology and Secured Transactions uses a hybrid approach to boosting the security of online applications, particularly within the realm of cloud computing. By merging two distinct techniques—homomorphic encryption and the squirrel search algorithm (SSA)—the study demonstrates a significant enhancement in the security of cloud computing models.
February 19th, 2024Source

LockBit ransomware disrupted by global police operation
Law enforcement agencies from 10 countries have disrupted the notorious LockBit ransomware operation in a joint operation known as ''Operation Cronos."
February 19th, 2024Source

Log4j lessons learned: A blueprint for zero-day defence
Two years ago, the zero-day vulnerability, known as Log4Shell unwrapped itself spoiling holiday celebrations for many across the globe leaving organizations scrambling for a fix before it could be exploited.
February 19th, 2024Source

New Guides Aim to Help Health Sector Beef Up Cyber, Privacy
HHS OCR, NIST Finalize HIPAA Cyber Guide; HSCC Issues Security, Privacy Resource
February 19th, 2024Source or Source or Source or Source or Source

NIST Offers Concrete Steps for Secure Software Development
New Guidelines Include 'Absolutely Crucial' Steps to Enhance Security, Experts Say
February 19th, 2024Source or Source or Source or Source

North Korean hackers linked to defense sector supply-chain attack
In an advisory today Germany's federal intelligence agency (BfV) and South Korea's National Intelligence Service (NIS) warn of an ongoing cyber-espionage operation targeting the global defense sector on behalf of the North Korean government.
February 19th, 2024Source

Over 28,500 Exchange servers vulnerable to actively exploited bug
Up to 97,000 Microsoft Exchange servers may be vulnerable to a critical severity privilege escalation flaw tracked as CVE-2024-21410 that hackers are actively exploiting.
February 19th, 2024Source

People cannot be patched
When an organization is aware software is vulnerable, it focuses on patching systems to mitigate the risk. Likewise, when security technology becomes outdated, newer versions plug the gaps. However, with people there's no patch or update readily available.
February 19th, 2024Source

Protecting EHR Systems Against Attacks and Compromises
Why Are EHRs So Vulnerable and How Can Organizations Get Better at Protecting Them?
February 19th, 2024Source or Source or Source or Source or Source

Ransomware Experts See Problems With Banning Ransom Payments
Would Criminals Care? Might Victims Still Pay? Would Hospitals Be Exempt?
February 19th, 2024Source or Source or Source or Source or Source

Ransomware Group Takes Credit for LoanDepot, Prudential Financial Attacks
The BlackCat/Alphv ransomware group has taken credit for the LoanDepot and Prudential Financial attacks, threatening to sell or leak data.
February 19th, 2024Source

Research reveals massive failures in US cybersecurity laws
In the world of advancing technology, cyberattacks have been on the rise, causing a potential risk of stolen personal data across 400 million users. In response, governments in all 50 states have introduced breach notification laws (BNLs) mandating that companies notify a consumer if their data has been breached.
February 19th, 2024Source

Russian Cyberspies Exploit Roundcube Flaws Against European Governments
Russian cyberespionage group targets European government, military, and critical infrastructure entities via Roundcube vulnerabilities.
February 19th, 2024Source

Tech Giants Pledge to Curb AI-Made Election Misinformation
AI's Speed and Scale of Deception Is 'Unprecedented,' Says US Senator
February 19th, 2024Source or Source or Source or Source or Source

The best mobile VPNs: Expert tested
ZDNET tested the best mobile VPNs that combine speed, security, and intuitive apps to help you find the right one.
February 19th, 2024Source

The best password managers for 2024
Yes, you need a password manager. But it doesn't have to be overly complex.
February 19th, 2024Source

Ukrainian Extradited to US Over Alleged Raccoon Stealer Ties
Mark Sokolovsky Has Fought Extradition From the Netherlands Since March 2022 Arrest
February 19th, 2024Source or Source or Source or Source

Ukrainian Raccoon Infostealer Operator Extradited to US
Alleged Raccoon Infostealer operator Mark Sokolovsky is awaiting trial in the US, after being extradited from the Netherlands.
February 19th, 2024Source

Internet — Security Issues — February 16th, 2024

A Russian-controlled botnet of hundreds of routers has now been shut down by the US DOJ
Hundreds of routers used in homes and small offices were unknowingly used to spread malware via a Russian-made botnet. This week, the US Department of Justice announced that this botnet has now been shut down in an operation that took place in January 2024 but has now been revealed publicly.
February 16th, 2024Source

Alpha ransomware linked to NetWalker operation dismantled in 2021
Security researchers analyzing the Alpha ransomware payload and modus operandi discovered overlaps with the now-defunct Netwalker ransomware operation.
February 16th, 2024Source

Breach Roundup: Zeus Banking Trojan Leader Pleads Guilty
Also: Polish Prime Minister Says Previous Administration Deployed Pegasus Spyware
February 16th, 2024Source or Source or Source or Source or Source

Cyberint Ransomania empowers organizations to proactively defend against ransomware attacks
Cyberint is unveiling its latest contribution to the infosec community: Ransomania.
February 16th, 2024Source

Cyberwar: What Is It Good For?
CMO Red Curry, CISO Sam Curry on the Effects of Attacks on Critical Infrastructure
February 16th, 2024Source or Source or Source or Source

DOJ quietly removed Russian malware from routers in US homes and businesses
Feds once again fix up compromised retail routers under court order.
February 16th, 2024Source

Draft UN Cybercrime Treaty Could Make Security Research a Crime, Leading 124 Experts to Call on UN Delegates to Fix Flawed Provisions that Weaken Everyone's Security
Security researchers' work discovering and reporting vulnerabilities in software, firmware, networks, and devices protects people, businesses and governments around the world from malware, theft of critical data, and other cyberattacks. The internet and the digital ecosystem are safer because of their work.
February 16th, 2024Source

Eight Vulnerabilities Disclosed in the AI Development Supply Chain
Details of eight vulnerabilities found in the open source supply chain used to develop in-house AI and ML models have been disclosed. All have CVE numbers, one has critical severity, and seven have high severity.
February 16th, 2024Source

Employees tricked into downloading remote monitoring software
New research from Malwarebytes reveals that employees are being tricked into downloading remote monitoring and management tools like AnyDesk to open up back doors to corporate networks.
February 16th, 2024Source

Ex-Employee's Admin Credentials Used in US Gov Agency Hack
A threat actor employed the administrative credentials of a former employee to hack a US government organization.
February 16th, 2024Source

FDA Ramps Up Resources for Medical Device Cybersecurity
FDA's Dr. Suzanne Schwartz on How New 'Super Office' Boosts Agency's Cyber Efforts
February 16th, 2024Source or Source or Source or Source or Source

In Other News: US Hacks Iranian Spy Ship, Rhysida Ransomware Decryption, NIST Guidance
Noteworthy stories that might have slipped under the radar: US hacks Iranian military vessel used for spying, Rhysida ransomware free decryption tool, NIST guidance.
February 16th, 2024Source

ISMG Editors: What Happened to the Cyberwar in Israel?
Also: Potential HIPAA Audit Revival; Security Risks of Sovereign AI
February 16th, 2024Source or Source or Source or Source or Source

Mysterious 'MMS Fingerprint' Hack Used by Spyware Firm NSO Group Revealed
The existence of a previously unknown infection technique used by spyware firm NSO Group is suggested by a single line in a contract between NSO and the telecom regulator of Ghana.
February 16th, 2024Source

Navigating the AI Career Maze
CyberEd.io's Steve King on Job Opportunities Available in Age of AI
February 16th, 2024Source or Source or Source or Source or Source

North Korean hackers now launder stolen crypto via YoMix tumbler
The North Korean hacker collective Lazarus, infamous for having carried out numerous large-scale cryptocurrency heists over the years, has switched to using YoMix bitcoin mixer to launder stolen proceeds.
February 16th, 2024Source

On Point: Identity Fabric Is the Future of Cybersecurity
Improving Security by Integrating IAM Infrastructure, Applications and Services
February 16th, 2024Source or Source or Source or Source or Source

Permit.io Raises $8 Million for Authorization Platform
Tel Aviv startup raises $8 million in Series A funding to help developers add secure access approval flows to applications.
February 16th, 2024Source

Permit.io raises $8 million to simplify app development
Permit.io announced it has raised $8 million in Series A funding, led by Scale Venture Partners, along with NFX, Verissimo Ventures, Roosh Ventures, Firestreak, 92712, and other existing investors, to ensure application developers never have to build permissions again.
February 16th, 2024Source

Research espionage is a real threat—but a drastic crackdown could stifle vital international collaboration
Australia's research institutions are targets for nefarious actors, from China and elsewhere. The Australian Security Intelligence Organisation (ASIO) has publicly tabled an "awareness" of various attempts to compromise the sector.
February 16th, 2024Source

Sophos' Kris Hagerman Steps Down as CEO; Joe Levy Takes Helm
Hagerman Moves to Advisory Role After Leading Company for the Past 12 Years
February 16th, 2024Source or Source or Source or Source or Source

To Avoid Bankruptcy, EMR Firm Settles Lawsuit for $4M
Pediatric Tech Vendor Hit by 2022 Data Breach Affecting 3 Million - Mostly Children
February 16th, 2024Source or Source or Source or Source or Source

U.S. authorities disrupt Russian intelligence's botnet
In January 2024, an operation dismantled a network of hundreds of SOHO routers controlled by GRU Military Unit 26165, also known as APT 28, Sofacy Group, Forest Blizzard, Pawn Storm, Fancy Bear, and Sednit. This network facilitated various crimes, including extensive spearphishing and credential harvesting against entities of interest to the Russian government, such as U.S. and foreign governments, military, and key security and corporate sectors.
February 16th, 2024Source

Ukrainian Extradited to US Over Alleged Raccoon Stealer Ties
Mark Sokolovsky Has Fought Extradition From the Netherlands Since March 2022 Arrest
February 16th, 2024Source or Source or Source or Source or Source

Ukrainian Pleads Guilty in US to Key Role in Zeus, IcedID Malware Operations
Ukrainian national Vyacheslav Igorevich Penchukov has pleaded guilty to holding key roles in the Zeus and IcedID malware operations.
February 16th, 2024Source

Unlocking business potential through outcome-based security [Q&A]
Traditionally, organizations have focused on measuring the results of their cyber security strategies in terms of threat events or security incidents to determine how effective their security controls are.
February 16th, 2024Source

US FTC Proposes Penalties for Deepfake Impersonators
FTC Says It Should Be Able to Sue Providers Who Know Their Tech Is Used for Fraud
February 16th, 2024Source or Source or Source or Source or Source

US Offers $10 Million for Information on BlackCat Ransomware Leaders
The US announces a $10 million reward for information on key members of the Alphv/BlackCat ransomware group.
February 16th, 2024Source

Vulnerabilities in CUSG CMS Exposed Credit Unions to Attacks
Three vulnerabilities in CU Solutions Group CMS exposed 275 credit unions to credential theft, account takeover.
February 16th, 2024Source

What Is a Passphrase? Examples, Types & Best Practices
A passphrase functions as a password, granting you access to a system or application, but instead of a string of random characters, it's a combination of words, numbers and symbols. Passphrases are typically longer than passwords and easier to remember since they can be composed of a series of words or a meaningful phrase.
February 16th, 2024Source

Zeus, IcedID malware kingpin faces 40 years in slammer
Nearly a decade on the FBI's Cyber Most Wanted List after getting banks to empty vics' account
February 16th, 2024Source

Internet — Security Issues — February 14th, 2024

Albanian Authorities Accuse Iranian-Backed Hackers of Cyberattack on Institute of Statistics
Albania's cybersecurity authorities have accused a hacker group "sponsored" by the Iranian government of attacking the country's Institute of Statistics earlier this month.
February 14th, 2024Source

Appdome unveils Geo Compliance suite to thwart spoofing and enhance mobile app security
Appdome unveiled its new Geo Compliance feature set, allowing mobile brands to trust the user's location and detect location spoofing, fake GPS apps, VPN use, SIM swaps and other methods used to circumvent geo restrictions in mobile applications.
February 14th, 2024Source

Armis acquires CTCI to improve pre-attack threat hunting technology
Armis announced it has agreed to acquire CTCI (Cyber Threat Cognitive Intelligence), a privately held company specializing in AI-powered pre-attack threat hunting technology.
February 14th, 2024Source

Asset Management Firm Armis Acquires Honeypot Maker CTCI
Deal Between Private Companies Is Worth About $20 Million
February 14th, 2024Source or Source or Source or Source or Source

Beyond the Hype: Questioning FUD in Cybersecurity Marketing
Could cybersecurity professionals benefit from FUD awareness training in the same way that users benefit from phishing awareness training?
February 14th, 2024Source

Bumblebee malware wakes from hibernation, forgets what year it is, attacks with macros
Trying to break in with malicious Word documents? How very 2015 of you
February 14th, 2024Source

Chipmaker Patch Tuesday: AMD and Intel Patch Over 100 Vulnerabilities
AMD and Intel patch dozens of vulnerabilities on February 2024 Patch Tuesday, including multiple high-severity bugs.
February 14th, 2024Source

Corporate users getting tricked into downloading AnyDesk
Hackers are leveraging the AnyDesk remote desktop application in a phishing campaign targeting employees, Malwarebytes warns.
February 14th, 2024Source

Cyberhaven Linea AI protects vital corporate data
Cyberhaven launched Linea AI, an AI platform designed to combat the most critical insider risks threatening vital corporate data.
February 14th, 2024Source

Data brokers have your personal info. Here's how to wipe it clean
Removing yourself from these databases is an aggravating version of whack-a-mole.
February 14th, 2024Source

Explanation of the Current Alert Level of GUARDED
On February 21, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to vulnerabilities in Mozilla products. On February 21, the MS-ISAC released an advisory for multiple vulnerabilities in Mozilla products, the most severe of which could allow for arbitrary code execution.
February 14th, 2024Source

Europe's AI Act Poised to Become Law After Committees Vote
Act Will Require Developers to Allow a Copyright Holder to Opt Out
February 14th, 2024Source or Source or Source or Source or Source

France Uncovers Russian Disinformation Campaign
'Portal Kombat' Is an Automated Pro-Russian Propaganda Network
February 14th, 2024Source or Source or Source or Source or Source or Source or Source

German battery maker Varta halts production after cyberattack
Battery maker VARTA AG announced yesterday that it was targeted by a cyberattack that forced it to shut down IT systems, causing production to stop at its plants.
February 14th, 2024Source

Google Threat Analysis Group's Spyware Research: How CSVs Target Devices and Applications
A new publication from Google's Threat Analysis Group focuses on commercial surveillance vendors (PDF), whose services are bought by governments for monitoring or spying purposes. Google is currently tracking more than 40 CSVs, most of which are highly technical with the ability to develop spyware and zero-day exploits to compromise their targets, particularly on Android and iOS devices.
February 14th, 2024Source

How are state-sponsored threat actors leveraging AI?
Microsoft and OpenAI have identified attempts by various state-affiliated threat actors to use large language models (LLMs) to enhance their cyber operations.
February 14th, 2024Source

IBM, ISC2 Offer Cybersecurity Certificate
The entry-level IBM and ISC2 Cybersecurity Specialist Professional Certificate takes four months to complete.
February 14th, 2024Source

Is Ransomware Finally in Decline? Groups Are 'Struggling'
Researchers See Waning Mystique, Use of Ghost Groups, Breach Tricks, Trauma of War
February 14th, 2024Source or Source or Source or Source or Source

KeyTrap DNS Attack Could Disable Large Parts of Internet: Researchers
Patches released for a new DNSSEC vulnerability named KeyTrap, described as the worst DNS attack ever discovered.
February 14th, 2024Source

LockBit claims ransomware attack on Fulton County, Georgia
The LockBit ransomware gang claims to be behind the recent cyberattack on Fulton County, Georgia, and is threatening to publish "confidential" documents if a ransom is not paid.
February 14th, 2024Source

LOKKER introduces a feature to notify users if their website breaches various privacy laws
LOKKER introduces a new feature included in its Privacy Edge software suite.
February 14th, 2024Source

Microsoft and OpenAI Collaborate on AI Security, Block State-Sponsored Attackers
Microsoft and OpenAI have shut down five state-sponsored hacking groups that were using OpenAI's large language models (LLMs) "in support of malicious cyber activities," per announcements this week.
February 14th, 2024Source

More Signs of a Qakbot Resurgence
Qakbot Wouldn't Be the First Trojan to Come Back After a Takedown
February 14th, 2024Source or Source or Source or Source or Source

North Korean Hackers Target South Korean President's Office
Attackers Accessed Details of State Visits to UK, France in Private Email Account
February 14th, 2024Source or Source or Source or Source

Prudential Financial Discloses Data Breach
Prudential Financial says administrative and user data was compromised in a cyberattack earlier this month.
February 14th, 2024Source

Prudential Financial finds cybercrims lurking inside its IT systems
Some company admin and customers data exposed, but bad guys were there for 'only' a day
February 14th, 2024Source

Resecurity partners with CyberPeace Foundation to address emerging cyber threats
Resecurity and CyberPeace Foundation have joined forces through a Memorandum of Understanding (MoU) to enhance cybersecurity measures worldwide.
February 14th, 2024Source

Romanian hospital ransomware crisis attributed to third-party breach
Emergency impacting more than 100 facilities appears to be caused by incident at software provider
February 14th, 2024Source

Russian and North Korean hackers used OpenAI tools to hone cyberattacks
State actors were getting help to draft phishing emails and debug code.
February 14th, 2024Source

SAP Patches Critical Vulnerability Exposing User, Business Data
SAP patches a critical code-injection vulnerability in the SAP ABA (Application Basis) cross-application component.
February 14th, 2024Source

Seal Security raises $7.4 million to secure open source with GenAI
Seal Security announced it has emerged from stealth with a $7.4 million seed funding round led by Vertex Ventures Israel, with participation from Crew Capital, PayPal Alumni Fund, and Cyber Club London.
February 14th, 2024Source

South Korea Says Presumed North Korean Hackers Breached Personal Emails of Presidential Staffer
South Korean President Yoon Suk Yeol's office said presumed North Korean hackers breached the personal emails of one of his staff members.
February 14th, 2024Source

Southern Water cyberattack expected to hit hundreds of thousands of customers
Brit utility also curiously disappears from Black Basta leak site
February 14th, 2024Source

They're Back: HHS OCR Plans to Resurrect Random HIPAA Audits
Agency Is Surveying 207 Previously Audited Firms to Prepare for Next Audit Cycle
February 14th, 2024Source or Source or Source or Source

They're Back: HHS OCR Plans to Resurrect Random HIPAA Audits
Agency Is Surveying 207 Previously Audited Firms to Prepare for Next Audit Cycle
February 14th, 2024Source or Source or Source or Source or Source

Top measures to enhance cyber security for small and medium organizations (ITSAP.10.035)
Looking for steps you can take to protect your organization's networks and information from cyber threats? To get you started, we have summarized the 13 security control categories that are identified in our Baseline Cyber Security Controls for Small and Medium Organizations. By implementing these controls, you can reduce your risks and improve your ability to respond to security incidents.
February 14th, 2024Source

Trans-Northern Pipelines investigating ALPHV ransomware attack claims
Trans-Northern Pipelines (TNPI) has confirmed its internal network was breached in November 2023 and that it's now investigating claims of data theft made by the ALPHV/BlackCat ransomware gang.
February 14th, 2024Source

UK utility giant Southern Water says hackers stole personal data of hundreds of thousands of customers
U.K.-based water utility Southern Water has confirmed that hackers stole the personal data of as many as 470,000 customers in a recent data breach.
February 14th, 2024Source

USPTO: AI Can Assist Inventors But Can't Hold Patents
Humans Must Show Significant Role in AI-Assisted Cases to Get Inventor Label
February 14th, 2024Source or Source or Source or Source or Source

VicOne xNexus offers contextualized insights into complex attack paths
VicOne announced the xNexus next-generation vehicle security operations center (VSOC) platform.
February 14th, 2024Source

What enterprises need to know about cybersecurity compliance [Q&A]
Just as cybersecurity threats are constantly evolving, so are the compliance regulations that organizations must follow. And as these regulations tighten so the risks of non-compliance become higher.
February 14th, 2024Source

Windows Zero-Day Exploited in Attacks on Financial Market Traders
CVE-2024-21412, one of the security bypass zero-days fixed by Microsoft with Patch Tuesday updates, exploited by Water Hydra (DarkCasino).
February 14th, 2024Source

Zoom Patches Critical Vulnerability in Windows Applications
Zoom patches seven vulnerabilities in its products, including a critical-severity bug in its Windows applications.
February 14th, 2024Source

Internet — Security Issues — February 12th, 2024

91 percent of organizations experience software supply chain incidents
The overwhelming majority of organizations (91 percent) have experienced a software supply chain incident in the past 12 months, according to a new report.
February 12th, 2024Source

Account Takeover Campaign Hits Execs in Microsoft Azure
Attackers Downloaded Files Containing Financial, Security and User Information
February 12th, 2024Source or Source or Source or Source or Source

Bugcrowd Attains $102M Strategic Growth Funding Round
Company Will Use Investment to Expand Services, Says CEO Dave Gerry
February 12th, 2024Source or Source or Source

Bugcrowd raises $102 million to boost AI-powered crowdsourced security platform
Bugcrowd has secured $102 million in strategic growth funding to scale its AI-powered crowdsourced security platform offerings globally.
February 12th, 2024Source

CIS ESS Mobile offers visibility into blind spots on mobile devices
While most organizations focus cybersecurity efforts on fortifying their networks, the mobile devices connected to them often remain vulnerable. In addressing this gap, the Center for Internet Security (CIS) introduces CIS Endpoint Security Services (ESS) Mobile, a tailored solution offered exclusively to U.S. State, Local, Tribal, and Territorial (SLTT) organizations.
February 12th, 2024Source

Critical Fortinet FortiOS flaw exploited in the wild (CVE-2024-21762)
Fortinet has patched critical remote code execution vulnerabilities in FortiOS (CVE-2024-21762, CVE-2024-23313), one of which is "potentially" being exploited in the wild.
February 12th, 2024Source

Data Insights Are Key to Fighting Synthetic ID Fraud
Steve Lenderman on the Shift From Synthetic Identity to Synthetic Entity Fraud
February 12th, 2024Source or Source or Source or Source or Source

Decryptor for Rhysida ransomware is available!
Files encrypted by Rhysida ransomware can be successfully decrypted, due to a implementation vulnerability discovered by Korean researchers and leveraged to create a decryptor.
February 12th, 2024Source

Europe's largest caravan club admits wide array of personal data potentially accessed
Experts also put an end to social media security updates
February 12th, 2024Source

Exploitation of Another Ivanti VPN Vulnerability Observed
Organizations urged to hunt for potential compromise as exploitation of a recent Ivanti enterprise VPN vulnerability begins.
February 12th, 2024Source

ExpressVPN User Data Exposed Due to Bug
ExpressVPN disables split tunneling on Windows after learning that DNS requests were not properly directed.
February 12th, 2024Source

Free Rhysida ransomware decryptor for Windows exploits RNG flaw
South Korean researchers have publicly disclosed an encryption flaw in the Rhysida ransomware encryptor, allowing the creation of a Windows decryptor to recover files for free.
February 12th, 2024Source

Hackers exploit Ivanti SSRF flaw to deploy new DSLog backdoor
Hackers are exploiting a server-side request forgery (SSRF) vulnerability in Ivanti Connect Secure, Policy Secure, and ZTA gateways to deploy the new DSLog backdoor on vulnerable devices.
February 12th, 2024Source

Hackers uncover new TheTruthSpy stalkerware victims: Is your Android device compromised?
TechCrunch adds 50,000 new Android device identifiers to spyware lookup tool
February 12th, 2024Source

Jet engine dealer to major airlines discloses 'unauthorized activity'
Pulls part of system offline as Black Basta docs suggest the worst
February 12th, 2024Source

OneTrust platform enhancements accelerate AI adoption
OneTrust announced its newest platform features that make it easier for customers to govern their use of AI and accelerate AI innovation, ensure the responsible use of data across the entire data lifecycle, and achieve compliance program efficiency through enhanced automation and intelligence.
February 12th, 2024Source

Ongoing Azure Cloud Account Takeover Campaign Targeting Senior Personnel
An active cloud account takeover campaign has impacted dozens of Azure environments and compromised hundreds of user accounts.
February 12th, 2024Source

Partial Facebook Marketplace Database Allegedly Leaked by Hackers
The disclosure by the rogue group includes the theft of over 200,000 accounts' data.
February 12th, 2024Source

Ransomware attack forces 100 Romanian hospitals to go offline
100 hospitals across Romania have taken their systems offline after a ransomware attack hit their healthcare management system.
February 12th, 2024Source

Ransomware Disrupts Hospital Services in Romania and France
Emergency Services Are Suspended as Digital Systems Are Pulled Offline
February 12th, 2024Source or Source

Self-Destructing USB Tool Heats Your Flash Drive To Over 100C To Lock Your Data Down
Around the world, countries are plagued with oppression, corruption, and misguided leadership that journalists and ethical hackers are trying to fight. However, keeping data safe from prying eyes can be difficult in some of these places with restrictive laws and invasive policies in place.0
February 12th, 2024Source

Stealthy Cyberespionage Campaign Remained Undiscovered for Two Years
A possibly China-linked threat actor uses a custom backdoor in a cyberespionage campaign ongoing since at least 2021.
February 12th, 2024Source

Visa extends its digital wallet capabilities to minimize the risk of fraud
Visa announced extended digital wallet capabilities within Visa Commercial Pay, a suite of B2B payment solutions built in partnership with Conferma Pay to revolutionize how businesses manage transactions globally.
February 12th, 2024Source

VPN Log versus Zero-Log Policy: A Comprehensive Analysis
Discover the impact on privacy and troubleshooting in our comprehensive analysis, guiding you to make informed choices for a secure online experience.
February 12th, 2024Source

Warzone RAT Shut Down by Law Enforcement, Two Arrested
Warzone RAT dismantled in international law enforcement operation that also involved arrests of suspects in Malta and Nigeria.
February 12th, 2024Source

Why cyber risk assessment is critical to staying ahead of threats [Q&A]
The cybersecurity landscape is changing all the time and security teams are constantly searching for anything that can give them an edge in defending their systems.
February 12th, 2024Source

Internet — Security Issues — February 9th, 2024

Action1 platform update improves patching workflows
Action1 announced its latest release and the introduction of a new guiding concept for its business.
February 9th, 2024Source

AnyDesk Shares More Information on Recent Hack
AnyDesk has provided more information on the recent hack, including when the attack started and its impact.
February 9th, 2024Source

As Elections Loom, So Do Adversaries' Influence Operations
US, UK, South Korea and India Most Targeted for Election Interference, Experts Warn
February 9th, 2024Source or Source or Source

Botnet Attack Targeted Routers: A Wake-Up Call for Securing Remote Employees' Hardware
The FBI spotted this state-sponsored attack that highlights how home office setups can be overlooked when it comes to employees' cybersecurity.
February 9th, 2024Source

Cohesity Is Set to Acquire Veritas' Data Protection Business
The Combined Company Will Be Worth $7B, Firms Say
February 9th, 2024Source

Combating Malware Threats
Understanding the diverse array of malware types is crucial for individuals, organizations, and cybersecurity professionals.
February 9th, 2024Source

Cybercriminals are creating their own AI chatbots to support hacking and scam users
Artificial intelligence (AI) tools aimed at the general public, such as ChatGPT, Bard, CoPilot and Dall-E have incredible potential to be used for good.
February 9th, 2024Source

Fortinet Warns of New FortiOS Zero-Day
Fortinet patches CVE-2024-21762, a critical remote code execution vulnerability that may have been exploited in the wild.
February 9th, 2024Source

Fortinet's week to forget: Critical vulns, disclosure screw-ups, and that toothbrush DDoS attack claim
An orchestra of fails for the security vendor
February 9th, 2024Source

Hackers Are Exploiting a Critical FortiOS SSL VPN Bug
Patch or Disable the SSL VPN, Fortinet Says
February 9th, 2024Source or Source or Source or Source or Source

Hyundai Motor Europe victim of the Black Basta ransomware
Vehicle manufacturer Hyundai and its European branch Hyundai Motor Europe have fallen victim to a ransomware attack by the Black Basta group. This has become known because the ransomware gang has disclosed data from this cyber attack -- the vehicle manufacturer Hyundai had only reported a "technical problem" in response to inquiries from Bleeping Computer.
February 9th, 2024Source

In Other News: $350 Million Google Settlement, AI-Powered Fraud, Cybersecurity Funding
Noteworthy stories that might have slipped under the radar: $350 million Google+ data leak settlement, AI used for fraud, 2023 cybersecurity funding report.
February 9th, 2024Source

Infoblox says IT Pros Are Missing This Mega-Threat From Organised Global Cyber Criminals
Cyber security threat actor VexTrio is flying under the radar for most APAC region cyber security professionals because it is a web traffic distribution middle man rather than an endpoint source of malware.
February 9th, 2024Source

Internet-Exposed Water PLCs Are Easy Targets for Iran
Researchers Find Unprotected Unitronics Devices
February 9th, 2024Source or Source or Source or Source or Source

ISMG Editors: What CISOs Should Prepare for in 2024
Joe Sullivan Also Discusses Identity Management, AI, State of Information Sharing
February 9th, 2024Source or Source or Source or Source or Source

Ivanti Patches High-Severity Vulnerability in VPN Appliances
An XXE flaw in Ivanti Connect Secure, Ivanti Policy Secure, and ZTA gateways could lead to unauthenticated access to resources.
February 9th, 2024Source

Large Language Models Won't Replace Hackers
UK AI Safety Institute Says LLMs Can't Give Novice Hackers Advanced Capabilities
February 9th, 2024SourceSource

Lawmakers Want Clampdown on American VCs Funding Chinese Tech Companies
A congressional investigation finds that US venture capital firms invested billions in Chinese technology companies in semiconductor, AI and cybersecurity, sectors that are a threat to national security.
February 9th, 2024Source

Multiple Vulnerabilities in FortiOS Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in FortiOS, the most severe of which could allow for remote code execution. FortiOS is Fortinet's operating system used across many Fortinet devices. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution in the context of the system. Depending on the privileges associated with the service account, an attacker could then install programs; view, change, or delete data. Service accounts that are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
February 9th, 2024Source

New macOS Backdoor Linked to Prominent Ransomware Groups
Written in Rust, the new RustDoor macOS backdoor appears linked to Black Basta and Alphv/BlackCat ransomware.
February 9th, 2024Source

New RustDoor macOS malware impersonates Visual Studio update
A new Rust-based macOS malware spreading as a Visual Studio update to provide backdoor access to compromised systems uses infrastructure linked to the infamous ALPHV/BlackCat ransomware gang.
February 9th, 2024Source

Number of Attacks Against Critical Infrastructure Is Growing
New Report Shows a Surge in OT/IoT Threats and a 123% Increase in Hacking Attempts
February 9th, 2024Source or Source or Source or Source

Securing the Keys to the Kingdom: Exploring the Depths of Privileged Access Management (PAM)
Discover how PAM, a key element of Zero Trust architecture, safeguards privileged access to secure sensitive information and prevent unauthorized access.
February 9th, 2024Source

Security firm now says toothbrush DDOS attack didn't happen, but source publication says company presented it as real
Dental IoT devices caused millions of Euros in damages for Swiss company, says report.
February 9th, 2024Source

Suspected EncroChat Admin Extradited to France
Authorities Hacked the End-to-End Encryption Platform in 2020
February 9th, 2024Source or Source or Source or Source or Source

Tax Season Alert: Common scams and cracked software
OpenText is committed to providing you with the latest intelligence and tips to safeguard your digital life, especially during high-risk periods like tax season. Our threat analysts are constantly monitor the ebb and flow of various threats. One trend that has recently caught our attention is the notable spike in malware-infected cracked software, particularly as we enter tax season.
February 9th, 2024Source

US Offers $10M Reward for Information on Hive Ransomware Leaders
One year after taking down Hive ransomware, US announces a $10 million reward for information on the group's key members.
February 9th, 2024Source

White House Launches AI Safety Consortium
The National Group Will Develop Guidelines for AI Safety, Security and Red-Teaming
February 9th, 2024Source or Source or Source or Source or Source

White House Targets Software Provider Accountability
Administration Developing 'Liability Regimes' for Manufacturers, Top Official Says
February 9th, 2024Source or Source or Source or Source or Source

Internet — Security Issues — February 7th, 2024

ASUSTOR Alerts Customers to Severe Vulnerability, Surveillance Center Gets Emergency Update
An emergency update is being pushed for Surveillance Center in response to a severe vulnerability detected in the software that could potentially allow an attacker to gain control elevated privileges to execute code on ADM to install malware. This update fixes this underlying vulnerability.
February 7th, 2024Source

AceMagic Promises It Won't Ship Anymore Mini PCs With Pre-Installed Spyware
Most of the time, preinstalled software on a PC can range from annoying to innocuous, with the occasional trip into "hey, this isn't so bad" territory. But sometimes, a PC can get imaged with something really nasty, causing buyers heartache well outside the norm. Such is the case with at least some AceMagic mini PCs, though the company swears it will remedy the situation.
February 7th, 2024Source

Internet — Secuirty Issues — Miscellaneous

Adaptive Research & Design Co.
data recovery from crashes, viruses, electrical surges, and sabotage, on hard and floppy drives under any operating system.
Provides a ServiceSource

Anti-Phishing Working Group
Committed to wiping out Internet scams and fruad.
An ArticleSource

Catapult Integrated Systems
is a premier systems integrator and commercial managed Internet services provider serving northern California since 1992.
Provides a ServiceSource

Data Security
Seclore is an information rights management company which helps to protect documents and information by preserving enterprise rights management.
Provides a ServiceSource

European Institute for Computer Anti-Virus Research (EICAR)
leads task forces, organizes conferences, and publishes documents.
Provides InformationSource

Leprechaun Software
develops VirusBUSTER, an anti-virus software that protects PCs from boot, program, macro, and email based viruses.
Provides InformationSource

Packet Analytics
Net/FSE, Packet Analytics' network data search engine, puts the power of real time searches over terabytes of NetFlow data in the hands of security analysts. Employing sophisticated algorithms, Net/FSE reduces exposure to significant business risk by enabling security specialists to quickly and determine the extent of a network alert.
Provides a ServiceSource

PhishTank
Out of the Net, into the Tank.
Provides a ServiceSource

Remove Windows Script Hosting
completely from your system.
Provides InformationSource

SecureList
Kaspersky Lab presents Lab Matters, a series of webcasts that get right to the heart of some of the IT security industry's hottest topics. in the first program, two of the company's leading antimalware experts, Costin Raiu and Magnus Kalkuhl, will be giving viewers the complete lowdown on targeted attacks and discussing a host of other fascinating topics.
Provides InformationSource

Stiller Research
We provide current anti-virus news, a list of myths regarding viruses, a virus information list and a list of in-the-wild viruses.
Provides InformationSource

Symantec Security Updates
library of documents on computer viruses including the top ten list of most common viruses and new viruses to be on the alert for, as well as general virus Q&Amp;A.
Provides InformationSource

Virus Alert
for GOOD TIMES, read about these fake viruses.
Provides InformationSource

VirusTotal
VirusTotal is a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines.
Provides a ServiceSource

The MerchantStore © 1997 — 2024