0

Mobile Cyberattacks Soar Especially Against Android Users

Thứ Sáu, 30 tháng 6, 2023
The number of malware samples is up as attackers aim to compromise users where they work and play: Their smartphones.
0

Nokod Raises $8M Seed Round From Seasoned Cybersecurity Investors to Enhance Low-Code/No-Code App Security

Nokod Security is building a platform that enables organizations to secure in-house low-code/no-code custom applications by scanning for security and compliance issues and applying remediation policies
0

Iran-Linked APT35 Targets Israeli Media With Upgraded Spear-Phishing Tools

The APT35 group (aka Charming Kitten), have added backdoor capabilities to their spear-phishing payloads — and targeted an Israeli reporter with it.
0

African Nations Face Escalating Phishing & Compromised Password Cyberattacks

Cyberattacks against organizations in some African nations increased significantly in 2022, despite a major expansion in cybersecurity hiring to support cloud and digital migration.
0

Make Diversity the 'How' Not the 'What' of Cybersecurity Success

Cybersecurity leaders should strive to reward high-performing teams that are powered by high levels of inclusion.
0

Google Cloud GenAI Is Coming to Thales' Data Security Platform

Thales will build new machine learning-powered data discovery and classification features based on Google Cloud's Vertex AI.
0

Thousands of Filipinos Others Rescued From Forced Cybercrime Labor

Thứ Năm, 29 tháng 6, 2023
Workers were lured in by false job promises from Facebook ads, only to be tricked into committing cybercrimes with no way out.
0

AI-Enabled Voice Cloning Anchors Deepfaked Kidnapping

Virtual kidnapping is just one of many new artificial intelligence attack types that threat actors have begun deploying, as voice cloning emerges as a potent new imposter tool.
0

Cybersecurity Is the Healthcare Your Organization Needs

Organizations should consider their security practices the same way people think about their well-being. Focus on staying healthy instead of finding a new pill for every security symptom you see.
0

US Patent Office Hacked Trademark Apps Accessed

Misconfiguration exposed the physical addresses of 60,000 patent filers over three years.
0

NPM Plagued With 'Manifest Confusion' Malware-Hiding Weakness

Thứ Tư, 28 tháng 6, 2023
The popular package manager for software developers has been vulnerable to this attack vector for a while, and negligent in fixing the problem, according to a former employee.
0

6 Ways Cybersecurity is Gut-Checking the ChatGPT Frenzy

Generative AI chatbots like ChatGPT are the buzziest of the buzzy right now, but the cyber community is starting to mature when it comes to assessing where it should fit into our lives.
0

LetMeSpy Phone-Tracking App Hacked Revealing User Data

With at least 13,000 compromised devices in the data leak, it is still unknown who the threat actor is or whether or not victims will be personally notified.
0

Cato Networks Revolutionizes Network Security With Real-Time Machine Learning-Powered Protection

The combination of data science expertise, cloud resources, and Cato's vast data lake enables real-time, ML-powered protection against evasive cyberattacks, reducing risk and improving security.
0

Malwarebytes ChatGPT Survey Reveals 81% are Concerned by Generative AI Security Risks

Survey also uncovers 63% of respondents distrust ChatGPT while 51% question AI's ability to improve Internet safety.
0

FIDO Alliance Publishes Guidance for Deploying Passkeys in the Enterprise

Half-day virtual Authenticate Summit to educate on how passkeys can fit into a variety of enterprise environments.
0

Jscrambler Launches JavaScript Scanner for PCI DSS 4.0 Compliance

Thứ Ba, 27 tháng 6, 2023
The free tool aims to help organizations meet the requirements of the new version of the payment standard, which takes effect in March 2024.
0

Trans-Rights Hacktivists Steal City of Ft. Worth's Data

In a move to embarrass the city, hacking group known as SiegedSec accessed thousands of files with administrator logins, but it's making no ransom demands.
0

Pilot Applicant Information for American Southwest Hacked

The attack exposed personal information from pilot applicants, prompting both airlines to ditch their third-party provider and move services internally.
0

Most Enterprise SIEMs Blind to MITRE ATT&CK Tactics

Organizations are largely deluded about their own security postures, according to an analysis, with the average SIEM failing to detect a whopping 76% of attacker TTPs.
0

Why the FDA's SBOM Mandate Changes the Game for OSS Security

The new FDA software bill of materials (SBOM) guidelines for medical devices could have broad impact on the healthcare industry and the broader open source ecosystem.
0

Why Cyber Funding Flows for Rural Water Systems

The $7.5 million in new funds from the Cybersecurity for Rural Water Systems Act of 2023 is not just a drop in the bucket for crucially important rural water systems.
0

Preventing Cyberattacks on Schools Starts With K12 Cybersecurity Education

By investing in a strong future cybersecurity workforce, we can prevent future attacks on US critical infrastructure before they occur.
0

Twitter Celeb Account Hacker Heads to Jail for 5 Years

Thứ Hai, 26 tháng 6, 2023
Extradited from Spain, PlugWalkJoe has been sentenced in US court and is now headed to federal prison on a raft of charges related to account hijacking and cyber stalking.
0

It's Open Season on Law Firms for Ransomware & Cyberattacks

Law firms have an ethical responsibility to protect their clients' sensitive information, but a recent swell of cyberattacks does not seem to be enough to convince law firms to shore up cybersecurity.
0

Cl0p in Your Network? Here's How to Find Out

Companies targeted by hacking groups with Cl0p ransomware typically have several chances to catch the attack prior to the payload being deployed, experts say.
0

Remediation Ballet Is a Pas de Deux of Patch and Performance

AI-generated code promises quicker fixes for vulnerabilities, but ultimately developers and security teams must balance competing interests.
0

How Infrastructure as Code Can Help Minimize Human Error

Infrastructure as code lets organizations manage cloud infrastructure with the same versioning, testing, and automation processes they use for application code.
0

Trojanized Super Mario Installer Goes After Gamer Data

A legitimate installer for the popular Nintendo game infects Windows machines with various malware, including a cryptominer and an infostealer, again showcasing the importance of remote worker security hygiene.
0

3 Steps to Successfully & Ethically Navigate a Data Breach

In this day of "not if, but when" for breaches, transparency and full disclosure are important to salvage a company's reputation and keep public trust.
0

How Active Directory Bridging Extends Security Automation to Hybrid IT Environments

Chủ Nhật, 25 tháng 6, 2023
AD bridging extends the reach of your AD domain to non-Windows systems, providing centralized security, single sign-on, and compliance.
0

Silobreaker Unveils Geopolitical Threat Intelligence Capabilities With RANE at Infosecurity Europe 2023

Thứ Sáu, 23 tháng 6, 2023
Integration provides threat intel teams with an early warning system for geopolitical events that could trigger cyberattacks.
0

Suspicious Smartwatches Mailed to US Army Personnel

Unknown senders have been shipping smartwatches to service members, leading to questions regarding what kind of ulterior motive is at play, malware or otherwise.
0

Microsoft Teams Attack Skips the Phish to Deliver Malware Directly

Exploiting a flaw in how the app handles communication with external tenants gives threat actors an easy way to send malicious files from a trusted source to an organization's employees, but no patch is imminent.
0

Black Hat Asia 2023: Cybersecurity Maturity and Concern in Asia

Black Hat Asia 2023 showed that cybersecurity is nascent among organizations in Asia with opportunities for improvement.
0

Growing SaaS Usage Means Larger Attack Surface

Thứ Năm, 22 tháng 6, 2023
Software-as-a-service expands an organization's attack surface, and security teams need to understand how to address those risks.
0

CISA FBI Offer $10M for Cl0p Ransomware Gang Information

The announcement was posted on Twitter via the Rewards for Justice Twitter account, alongside encrypted messaging system options for anyone to get into contact should they have viable information.
0

Even With No Recession Smaller Firms Aim to Consolidate Security Tools

Small and midsized companies work to jettison some security tools to simplify operations and reduce cost, even as any economic downturn continues to remain at bay.
0

Ironscales Adds AI Assistant to Suss Out Phishing Attempts

Thứ Tư, 21 tháng 6, 2023
The company says its Themis Co-pilot for Outlook helps recipients discern business email compromise attacks, reducing false positives for security staff.
0

Avast Norton Parent Latest Victim of MOVEit Ransomware Attacks

Gen Digital, the parent company of the security companies, is the latest victim in a rash of Cl0p attacks on the bug in the MOVEit transfer software, leading to employee data being revealed.
0

Ransomware Misconceptions Abound To the Benefit of Attackers

INFOSEC23 — London — It's time to update what we think we understand about ransomware, including new defensive measures and how fast the attack response should be.
0

Keep Job Scams From Hurting Your Organization

From fake job listings that ding your reputation to fake job applicants who hack your network, job scams are a major threat.
0

SMB Edge Devices Walloped With Asus Zyxel Patch Warnings

A slew of critical advisories this week showcase an exploding edge device attack surface for SMBs, which have limited cybersecurity protection, visibility, and maintenance available.
0

Emerging Ransomware Group 8Base Doxxes SMBs Globally

A threat you've never heard of is using double extortion attacks on mom-and-pop shops around the globe.
0

100K Infected Devices Leak ChatGPT Accounts to the Dark Web

Thứ Ba, 20 tháng 6, 2023
Infostealers are as alive as ever, wantonly sweeping up whatever business data might be of use to cybercriminals, including OpenAI credentials.
0

Jordanian Cyber Leaders Kick Off Cybersecurity Framework Development

The nation of Jordan begins work on a national cybersecurity framework to align with international practices and better mitigate threats.
0

Fresh Ransomware Gangs Emerge As Market Leaders Decline

The ransomware landscape is energized with the emergence of smaller groups and new tactics, while established gangs like LockBit see fewer victims.
0

Mysterious Mystic Stealer Spreads Like Wildfire in Mere Months

A criminal crowd-sourcing campaign has led to swift adoption of the stealer, which can pilfer key computer data, credentials from browsers and chat apps, and cryptocurrency from multiple wallets.
0

Hackers Will Be Quick to Bypass Gmail's Blue Check Verification System

It's still important to use other security measures, such as strong passwords and two-factor authentication, to protect your data.
0

Rorschach Ransomware: What You Need to Know

Learn how the latest ransomware variant has heightened attack execution speed and what that means for cybersecurity operations.
0

Consumer Data: The Risk and Reward for Manufacturing Companies

Thứ Hai, 19 tháng 6, 2023
To adequately address privacy, manufacturers need to think differently about data.
0

Name That Toon: Time to Spare?

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
0

US Investors Sniffing Around Blacklisted NSO Group Assets

Pressure mounts on the NSO Group's business viability as Khashoggi widow joins group of plaintiffs suing the Israeli firm for Pegasus spyware abuse.
0

Decoding Identity and Access Management For Organizations and Consumers

Workforce IAM and consumer IAM are not interchangeable — they serve different purposes and constituencies.
0

The Infrastructure Security Engineer Is a Unicorn Among Thoroughbreds

Thứ Sáu, 16 tháng 6, 2023
This new role safeguarding cloud deployments requires an exceedingly rare set of technical and soft skills.
0

Killnet Threatens Imminent SWIFT World Banking Attacks

The DDoS collective claims to be teaming up with ReVIL and Anonymous Sudan for destructive financial attacks in retaliation for US aid in Ukraine, but the partnerships (and danger) are far from verified.
0

Third MOVEit Transfer Vulnerability Disclosed by Progress Software

MOVEit has created a patch to fix the issue and urges customers to take action to protect their environments, as Cl0p attacks on the service continue to mount.
0

How Do I Protect My API Keys From Appearing in GitHub Search Results?

Thứ Năm, 15 tháng 6, 2023
A few lines of code can help you prevent accidental exposure, manage sensitive information, and maintain different configurations for various environments.
0

Keytos Uncovers 15000 Vulnerable Subdomains per Month in Azure Using Cryptographic Certificates

0

Critical Barracuda ESG Zero-Day Linked to Novel Chinese APT

A PRC-aligned actor used a trio of custom malware to take advantage of inherent weaknesses in edge appliances.
0

Angola Marks Technology Advancements With Cybersecurity Academy Plans

The academy is meant to ensure a safe and strong telecommunication service and information technologies for Angola's citizens, the president said.
0

Borderless Data vs. Data Sovereignty: Can They Co-Exist?

Organizations that remain compliant with data-sovereignty regulations while enabling cross-border data sharing gain significant competitive advantage because they can make quick, agile, and informed decisions.
0

Network-Security Testing Standard Nears Prime Time

Thứ Tư, 14 tháng 6, 2023
NetSecOpen recently released a new draft of its testing and benchmarking guide, which could be adopted later this year.
0

Cryptocurrency Attacks Quadrupled as Cybercriminals Cash In

Attackers continue to attempt to steal Bitcoin and other virtual coins, with a 40% increase in phishing attacks and fourfold increase in incidents.
0

Russian APT 'Cadet Blizzard' Behind Ukraine Wiper Attacks

Microsoft says Cadet Blizzard wielded a custom wiper malware in the weeks leading up to Russia's invasion of Ukraine, and it remains capable of wanton destruction.
0

Illinois Hospital Closure Showcases Ransomware's Existential Threat

St. Margaret's Health is shutting down due to a 2021 ransomware attack and other factors. It's an object lesson for how small and rural healthcare facilities face grave cyber-risk when extortionists come calling.
0

XSS Vulnerabilities Found in Microsoft Azure Cloud Services

Microsoft quickly issued patches for the two security issues, which could allow unauthorized access to cloud sessions.
0

Moving the Cyber Industry Forward Requires a Novel Approach

CISOs need to be better equipped with strategic metrics and proof points to better align their organization for defense against the ever-changing threat landscape.
0

Microsoft Fixes 69 Bugs but None Are Zero-Days

The June 2023 Patch Tuesday security update included fixes for a bypass for two previously addressed issues in Microsoft Exchange and a critical elevation of privilege flaw in SharePoint Server.
0

Chinese Threat Actor Abused ESXi Zero-Day to Pilfer Files From Guest VMs

Thứ Ba, 13 tháng 6, 2023
Mandiant's ongoing investigation of UNC3886 has uncovered new details of threat actors' TTPs.
0

Popular Apparel Clothing Brands Being Used in Massive Phishing Scam

Threat actors have created over 3,000 domains, some as old as two years, to lure in customers to false, name brand websites for personal financial gain.
0

Harness the Power of PKI to Battle Data Breaches

The average cost of a data breach is $4.35 million. Understand the power of public key infrastructure (PKI) and its role in encrypting data and battling breaches.
0

How Security Leaders Should Approach Cybersecurity Startups

Vendors and buyers both have the power to make the industry a better place. What's needed is more collaboration, mutual support, and respect.
0

Researchers Report First Instance of Automated SaaS Ransomware Extortion

Thứ Hai, 12 tháng 6, 2023
The attack highlights growing interest among threat actors to target data from software-as-a-service providers.
0

New Loader Delivering Spyware via Image Steals Cryptocurrency Info

Sophisticated attackers are lacing malware into PNG image files in order to steal cryptocurrency and business information.
0

Use of Multifactor Authentication (MFA) Nearly Doubles Since 2020, Okta Secure Sign-in Trends Reports Finds

Okta platform data-based study finds FastPass and WebAuthn offer far stronger security and faster, more reliable user experiences.
0

10 Important Security Tasks You Shouldn't Skip

Time and money are valuable and finite, but some actions are well worth spending those resources on.
0

'Stealth Soldier' Attacks Target Libyan Government Entities With Surveillance Malware

Surveillance malware targets Libyan government entities, with possible links to a 2019 Egypt attack campaign.
0

Supply Chain Attack Defense Demands Mature Threat Hunting

Active threat hunting is the best protection against supply chain attacks like MOVEit and 3CX, experts say.
0

Doing Less With Less: Focusing on Value

Always reach for defense in depth with proposed security changes. Measure and test results, focus on items of greatest impact, and get C-suite members involved to drive better outcomes.
0

Passkeys See Fresh Momentum With New Pilot Programs

Thứ Sáu, 9 tháng 6, 2023
Apple adds API that will enable sharing of passkeys across platforms, and Google offers passkey authentication in beta for Google Workspace and Google Cloud.
0

DOS Attacks Dominate, but System Intrusions Cause Most Pain

In the latest Verizon "Data Breach Investigations Report," denial-of-service attacks are the most common type of security incident, but when it comes to breaches, nearly four-in-ten attackers compromise systems.
0

Brand-New Security Bugs Affect All MOVEit Transfer Versions

Progress has issued a second patch for additional SQL flaws that are distinct from the zero-day that Cl0p ransomware gang is exploiting.
0

'Asylum Ambuscade' Cyberattackers Blend Financial Heists & Cyber Espionage

In a rare mix of motivations, the cyberattack group has been linked to both financial cybercrime and political spying efforts on governments.
0

South African Female Students Offered Cyber Scholarship

Women of color are being offered a scholarship opportunity in South Africa — the offer will cover costs for pursuing a cyber career and encourage greater diversity of those studying cybersecurity courses.
0

5 Tips for Modernizing Your Security Operations Center Strategy

A solid, dependable SOC strategy that is scalable in the face of various security threats is essential to reduce cybersecurity risks to your business.
0

How Continuous Monitoring and Threat Intel Can Help Prevent Ransomware

Security teams should be empowered with the right amount of intelligence to track new and emerging threats and connect that intel to historical data.
0

Cybercrooks Scrape OpenAI API Keys to Pirate GPT-4

Thứ Năm, 8 tháng 6, 2023
With more than 50,000 publicly leaked OpenAI keys on GitHub alone, OpenAI developer accounts are the third-most exposed in the world.
0

City of Dallas Still Clawing Back Weeks After Cyber Incident

The Texas city's networks have returned to 90% functionality following the May 3 Royal ransomware attack.
0

Cybersecurity Institute to Open in Saudi Arabia

The Global Cybersecurity Forum branch, which will be in Riyadh, is meant to enable the exchange of ideas and facilitate international projects and partnerships.
0

Barracuda Warns All ESG Appliances Need Urgent Rip & Replace

Patching, wiping ESG devices not enough to deny threat actor access following compromise, Barracuda says.
0

The Growing Cyber Threats of Generative AI: Who's Accountable?

In the wrong hands, malicious actors can use chatbots to unleash sophisticated cyberattacks that could have devastating consequences.
0

BeyondID Launches Initiative to Accelerate Zero Trust With Okta Identity Engine

Thứ Tư, 7 tháng 6, 2023
OIE upgrade roadmap helps organizations become more secure; saves time, resources.
0

Radiflow's CIARA 4.0 Delivers Actionable Insights to Simplify the Management of OT Cyber-Risk at Industrial Facilities

CIARA V4.0 boosts compliance with security regulations and best practices while providing effective mitigation guidance. "CISOs are doing more with less, making it challenging to understand their current standing across the OT Cybersecurity landscape," said Ilan Barda, Radiflow CEO and co-founder.
0

Cl0p Cybercrime Gang Delivers Ultimatum After Payroll Breach

Experts and researchers warn individuals and organizations that the cybercrime group is not to be trusted in their demands.
0

Cyber Essentialism & 'Doing Less With Less'

Cybersecurity benefits from a focus on the vital few chores rather than the trivial many. Find the "right things" to encourage strategic thinking, then move the culture needle to promote that policy.
0

The Key to Zero Trust Identity Is Automation

In a zero-trust world, a trusted identity is the key that unlocks access for people and devices to enter your enterprise’s key networks, systems, and resources.
0

Cisco Touts New AI-Based Security, SSE Features

Cisco laid out its AI plans and a vision for unified cloud security during Cisco Live 2023.
0

Verizon DBIR: Social Engineering Breaches Double, Leading to Spiraling Ransomware Costs

Thứ Ba, 6 tháng 6, 2023
Ransomware continues its runaway growth with median payments reaching $50,000 per incident.
0

Researchers Spot a Different Kind of Magecart Card-Skimming Campaign

In addition to injecting a card skimmer into target Magento, WooCommerce, Shopify, and WordPress sites, the the threat actor is also hijacking targeted domains to deliver the malware to other sites.
0

With SEC Rule Changes on the Horizon, Research Reveals Only 14% of CISOs Have Traits Desired for Cyber Expert Board Positions

0

ILTA and Conversant Group Release Cybersecurity Benchmarking Survey of the Legal Industry

Joint research highlights disconnect between legal IT and recommended cybersecurity practices.
0

Netskope Intelligent SSE Selected by Transdev to Secure and Connect its Hybrid Workforce

Implementation is part of Transdev's Cloud-First approach to better manage technological obsolescence.
0

US Aerospace Contractor Hacked With 'PowerDrop' Backdoor

Hackers used a little to do a lot, cracking a high-value target with hardly more than the living-off-the-land tools (PowerShell especially) found on any standard Windows computer.
0

Moonlighter Satellite Offers In-Orbit Target for Space Hackers

Thứ Hai, 5 tháng 6, 2023
Moonlighter, which offers red teams a chance at operational disruption, will be up for pwning at in August, timed with DEF CON.
0

Name That Edge Toon: Spring Chickens

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
0

Don't Overlook Twitter's Trove of Threat Intel for Enterprise Cybersecurity

Social media data can provide critical clues to help get ahead of the next cyberattack, experts say.
0

Varonis: Reducing Insider Threats Through Improved Data Security

In this Fast Chat segment, Dark Reading's Terry Sweeney and Varonis co-founder and CEO Yaki Faitelson discuss why we’re still seeing internal data breaches.
0

Mass Exploitation of Zero-Day Bug in MOVEit File Transfer Underway

With shades of the GoAnywhere attacks, a cyber threat actor linked to FIN11 is leveraging a bug in the widely used managed file transfer product to steal data from organizations in multiple countries.
0

After 'Inception' Attack, New Due Diligence Requirements Are Needed

To stem supply chain attacks, forging a new dynamic of shared cybersecurity hygiene accountability is the right thing to do.
0

PyPI's 2FA Requirements Don't Go Far Enough, Researchers Say

Thứ Sáu, 2 tháng 6, 2023
The Python Package Index will require developers to better secure their accounts as cyberattacks ramp up, but protecting the software supply chain will take more than that.
0

'PostalFurious' SMS Attacks Target UAE Citizens for Data Theft

SMS campaigns targeting members of the public in the United Arab Emirates have been detected.
0

DNB Strengthens its Network Security Posture and Productivity With Ericsson Security Manager Solution

Thứ Năm, 1 tháng 6, 2023
0

Cyversity and United Airlines to Provide Cybersecurity Training Scholarships to Cyversity Members

Program designed to equip women and underrepresented individuals with the necessary skills and knowledge to succeed in cybersecurity.
0

Tel Aviv Stock Exchange Selects CardinalOps to Reduce Risk of Breaches Due to Undetected Attacks

Enables financial services firm to operationalize MITRE ATT&CK with Splunk and eliminate detection coverage gaps based on organizational risk and priorities.
0

Amazon Pays $30.8M to Settle Ring Spying & Alexa Privacy Lawsuits

The global e-commerce company will pay millions of dollars in two separate lawsuits because of privacy and security violations, the FTC says.
0

Jetpack WordPress Plug-in API Bug Triggers Mass Updates

An audit uncovers an API-related security vulnerability dating back to Jetpack version 2.0 released in 2012 — and it affects millions of websites.
0

How Do I Reduce Security Tool Sprawl in My Environment?

When it comes to tool consolidation, focus on platforms over products.
0

Where SBOMs Stand Today

It's been two years since Executive Order 14028. By using SBOMs as a standard, organizations can manage software risks, protect their reputation, and improve their cybersecurity posture.