0

Cybersecurity Startup Morphisec Appoints Ron Reinfeld As CEO

Thứ Năm, 29 tháng 2, 2024
0

Entro Extends Machine Secrets and Identities Protection With Machine Identity Lifecycle Management

0

MITRE Rolls Out 4 Brand-New CWEs for Microprocessor Security Bugs

Goal is to give chip designers and security practitioners in the semiconductor space a better understanding of major microprocessor flaws like Meltdown and Spectre.
0

US Government Expands Role in Software Security

Thứ Tư, 28 tháng 2, 2024
The White House Office of the National Cyber Director puts software developers on notice, calling for a move to memory-safe programming languages and the development of security metrics.
0

'Voltzite' Zaps African Utilities as Part of Volt Typhoon's Onslaught

The China-backed APT that's been trying to set itself up inside US critical infrastructure for the purpose of disrupting physical processes is deploying a similar playbook in Africa.
0

Cyberattackers Lure EU Diplomats With Wine-Tasting Offers

A targeted attack aiming to exploit geopolitical relations between India and Europe delivers previously undocumented, uniquely evasive backdoor malware.
0

Apple, Signal Debut Quantum-Resistant Encryption, but Challenges Loom

Thứ Ba, 27 tháng 2, 2024
Apple's PQ3 for securing iMessage and Signal's PQXH show how organizations are preparing for a future in which encryption protocols must be exponentially harder to crack.
0

Mexico's 'Timbre Stealer' Campaign Targets Manufacturing

A new infostealer spreading to organizations across Mexico heralds 2024's fresh season of tax-themed phishing attacks.
0

4 Ways Organizations Can Drive Demand for Software Security Training

Developer-driven security programs place the development team at the center of reducing vulnerabilities.
0

eBay, VMware, McAfee Sites Hijacked in Sprawling Phishing Operation

Trusted brands like The Economist are also among the 8,000 entities compromised by Operation SubdoMailing, which is at the heart of a larger operation of a single threat actor.
0

UAC-0184 Targets Ukrainian Entity in Finland With Remcos RAT

Thứ Hai, 26 tháng 2, 2024
The IDAT Loader malware was used to deliver the cyber espionage tool, employing steganography, a seldom-seen technique in real-world attacks.
0

NIST Releases Cybersecurity Framework 2.0

New guidance expands the framework to consider organizations beyond critical infrastructure; it also addresses governance and supply chain cybersecurity.
0

Gulf Region Accelerates Adoption of Zero Trust

United Arab Emirates will likely be one of the first in the region to implement zero-trust security due to its heavy adoption of cloud technologies.
0

The Next Gen of Cybersecurity Could Be Hiding in Big Tech

Public-private partnerships, increasing cybersecurity budgets for public organizations, and retraining existing tech talent to make the jump to cyber will help ease the staffing crunch.
0

Lovers' Spat? North Korea Backdoors Russian Foreign Affairs Ministry

Thứ Sáu, 23 tháng 2, 2024
First Brad and Jennifer, now Kim and Putin? Romance truly is dead, as North Korea is caught spying (again) on its partner to the north with the Konni malware.
0

Orgs Face Major SEC Penalties for Failing to Disclose Breaches

In what could be an enforcement nightmare, potentially millions of dollars in fines, reputational damage, shareholder lawsuits, and other penalties await companies that fail to comply with the SEC's new data-breach disclosure rules.
0

Privacy Beats Ransomware as Top Insurance Concern

Despite ransomware losses remaining high, privacy violations have quickly risen to second in a list of expected cyber insurance claims costs.
0

Avast to Pay $16.5M Fine For Selling Consumer Browsing Data

The FTC found that Avast collected reams of personal data through its antivirus product, then sold it to more than 100 third parties without disclosing its practices.
0

iSoon's Secret APT Status Exposes China's Foreign Hacking Machinations

Thứ Năm, 22 tháng 2, 2024
Chinese government agencies are paying an APT, masked as a legitimate company, to spy on foreign and domestic targets of political interest.
0

Insurers Use Claims Data to Recommend Cybersecurity Technologies

Policy holders using certain technologies — such as managed detection and response (MDR) services, Google Workspace, and email security gateways — gain premium discounts from cyber insurers.
0

Zero-Click Apple Shortcuts Vulnerability Allows Silent Data Theft

Vulnerability CVE-2024-23204, affecting Apple's popular Shortcuts app, suggests a critical need for ongoing security awareness in the macOS and iOS ecosystem.
0

Russian Cyberattackers Launch Multi-Phase PsyOps Campaign

Operation Texonto spanned several months, using various Russian propaganda lures and spear-phishing to misinform and trick users into giving up Microsoft 365 credentials.
0

'VoltSchemer' Hack Allows Wireless Charger Takeovers

Thứ Tư, 21 tháng 2, 2024
Researchers tested their theory on nine chargers, each different and available to consumers, and found them all vulnerable to their attacks.
0

Critical ConnectWise RMM Bug Poised for Exploitation Avalanche

Two days after disclosure, most instances of the remote desktop tool remain unpatched, while cyberattackers have started in-the-wild exploitation — and researchers warn it could get ugly, fast.
0

DoT, White House Tackle the Chinese Threat to US Port Security

New investments and Coast Guard authority aim to curb the alleged threat that Chinese vendors pose to American maritime security.
0

Joomla XSS Bugs Open Millions of Websites to RCE

Thứ Ba, 20 tháng 2, 2024
Improper content filtering in a core function allows multiple paths to exploitation for CVE-2024-21726.
0

Median Ransomware Demands Grow to $600K a Pop

The now-disrupted LockBit gang outpaced its competitors in volume in 2023, as ransom amounts spiked 20% year-over-year.
0

'KeyTrap' DNS Bug Threatens Widespread Internet Outages

Thanks to a 24-year-old security vulnerability tracked as CVE-2023-50387, attackers could stall DNS servers with just a single malicious packet, effectively taking out wide swaths of the Internet.
0

Global Law Enforcement Disrupts LockBit Ransomware Gang

Operation Cronos, a collab between authorities in the US, Canada, UK, Europe, Japan, and Australia — seizes data and website associated with the prolific cybercriminal organization and its affiliates.
0

Cyber Insurance Needs to Evolve to Ensure Greater Benefit

A catastrophic cyber event hasn't yet come to pass, but vast amounts of personal data have been compromised. We need to be prepared for worst-case scenarios.
0

Misconfigured Custom Salesforce Apps Expose Corporate Data

Enterprises typically use the Java-like programming language to customize their Salesforce instances, but attackers are hunting for vulnerabilities in the apps.
0

Name That Toon: Keys to the Kingdom

Thứ Hai, 19 tháng 2, 2024
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
0

NSO Group Adds 'MMS Fingerprinting' Zero-Click Attack to Spyware Arsenal

The purveyor of the infamous Pegasus mobile spyware now has a new method for obtaining critical information from target iPhones and other mobile devices.
0

Q&A: The Cybersecurity Training Gap in Industrial Networks

Cyberattacks and threats increasingly are honed in on ICS/OT networks, but security training for operators of these critical infrastructure environments is perilously scarce.
0

CISO Corner: CIO Convergence, 10 Critical Security Metrics, & Ivanti Fallout

Thứ Sáu, 16 tháng 2, 2024
Also in this issue: Mideast investment, new FCC breach notification rules, and how Dark Reading readers use GenAI tools in their cybersecurity apparatus.
0

Enterprises Worry End Users Will be the Cause of Next Major Breach

Respondents in Dark Reading's Strategic Security Survey believe that the primary cause of their organization's next major data breach would involve social engineering, negligent users, and insecure remote workers.
0

Major Tech Firms Develop 'Tech Accord' to Combat AI Deepfakes

The accord covers initiatives to create more transparency regarding what tech firms like Meta, Microsoft, Google, TikTok, and OpenAI are doing to combat malicious AI, especially around elections.
0

CISA HBOM Framework Doesn't Go Far Enough

Thứ Năm, 15 tháng 2, 2024
CISA's recently introduced framework for hardware bill of materials is an important step in addressing semiconductor risks. But further tracking beyond manufacturing is critical to its usefulness.
0

DoJ Breaks Russian Military Botnet in Fancy Bear Takedown

The feds disrupted a Russian intelligence SOHO router botnet notable for being built with Moobot malware rather than custom code.
0

Microsoft, OpenAI: Nation-States Are Weaponizing AI in Cyberattacks

Thứ Tư, 14 tháng 2, 2024
It's not theoretical anymore: the world's major powers are working with large language models to enhance their offensive cyber operations.
0

Prudential Files Voluntary Breach Notice With SEC

The finance services giant says it was hacked — and reported the incident proactively before SEC requirements mandated it. It could be an anti-extortion move, or merely a brand protection effort.
0

Ransomware Epidemic at Romanian Hospitals Tied to Healthcare App

Threat actors first infected the Hipocrate Information System with a variant of the Phobos ransomware family — and then it spread across the nation's healthcare organizations.
0

BumbleBee Malware Buzzes Back on the Scene After 4-Month Hiatus

Cyberattacks targeting thousands of US organizations wields a new attack vector to deliver the versatile initial-access loader — and is a harbinger of a surge in threat activity.
0

FCC Requires Telecom & VoIP Providers to Report PII Breaches

Thứ Ba, 13 tháng 2, 2024
The Commission's breach rules for voice and wireless providers, untouched since 2017, have finally been updated for the modern age.
0

Ivanti VPN Flaw Exploited to Inject Novel Backdoor; Hundreds Pwned

A SAML vulnerability in Ivanti appliances has led to persistent remote access and full control for opportunistic cyberattackers.
0

Aircraft Leasing Company Acknowledges Cyberattack in SEC Filing

Black Basta ransomware claimed responsibility, but the company says its investigation is ongoing.
0

Middle East & Africa CISOs Plan to Increase 2024 Budgets by 10%

New data shows higher-than-expected cybersecurity growth in the Middle East, Turkey, and Africa region, thanks to AI and other factors.
0

Bugcrowd Secures $102M in Strategic Growth Funding to Scale AI-Powered Crowdsourced Security Platform

Thứ Hai, 12 tháng 2, 2024
0

33M French Citizens Impacted in Country's Largest-Ever Breach

Viamedis and Almerys, two payment processors widely used by French health insurers, were victims of cyberattackers who struck five days apart.
0

It's Time to Rethink Third-Party Risk Assessment

Continuously evaluating and updating your third-party risk assessment can improve your security posture and ensure your company doesn't have the next headline-making incident.
0

Fortinet, Ivanti Keep Customers Busy With Yet More Critical Bugs

Brand-new vulnerabilities from both vendors this week — one exploited in the wild — add to a steady stream of critical security issues in the security platforms.
0

China's Dogged Campaign to Portray Itself as Victim of US Hacking

After the US and its allies formally accused China of irresponsible and malicious behavior in cyberspace back in 2021, the government there has been on a mission to cast the US in the same light.
0

Ongoing Azure Compromises Target Senior Execs, Microsoft 365 Apps

Attackers are breaching cloud environments and playing games with corporate Microsoft 365 apps, and further victims are likely to come.
0

Ransomware Groups Claim Hits on Hyundai Motor Europe and a California Union

Thứ Sáu, 9 tháng 2, 2024
The unrelated cyberattacks both occurred in January.
0

MacOS Targeted by New Backdoor Linked to ALPHV Ransomware

MacOS data exfiltration malware poses as an update for Visual Studio code editor.
0

Deepfake Democracy: AI Technology Complicates Election Security

While cybersecurity risks to the democratic process have been pervasive for many years now, the prevalence of AI now represents new threats.
0

Middle East Cybersecurity Teams Want More Budget

Meanwhile, cyber threats are spiking in the region.
0

LastPass Warns on Password App Discovered in Apple App Store

Thứ Năm, 8 tháng 2, 2024
The fake app looks similar to the legitimate LastPass app in its branding, and it could be stealing users' credentials.
0

Iran-Israel Cyber War Goes Global

What started off as posturing from the Islamic Republic has turned into more serious cyberattacks against the US, Albania, and more.
0

New Report From Flare Highlights Pervasive Threat of Initial Access Brokers in NATO Countries

Thứ Tư, 7 tháng 2, 2024
0

Patch Now: Critical TeamCity Bug Allows for Server Takeovers

Cyberattackers can exploit a vulnerability in JetBrain's continuous integration and delivery (CI/CD) server (a popular APT target) to gain administrative control.
0

Q&A: Tel Aviv Railway Project Bakes in Cyber Defenses

How a light railway in Israel is fortifying its cybersecurity architecture amid an increase in OT network threats.
0

Twin Max-Severity Bugs Open Fortinet's SIEM to Code Execution

Thứ Ba, 6 tháng 2, 2024
Full 10s on the CVSS vulnerability severity scale have been assigned to two flaws discovered in Fortinet's FortiSIEM cybersecurity operations platform.
0

Crucial Airline Flight Planning App Open to Interception Risks

Airbus-owned NAVBLUE fixed the issue after a penetration testing firm disclosed the problem to the company.
0

'ResumeLooters' Attackers Steal Millions of Career Records

The cyberattackers used SQL injection and XSS to target 65 retail companies and job recruiters, stealing databases with unique emails and other sensitive records.
0

UAE Cybersecurity Official Warns of VPN Abuse

More than six million VPNs are now deployed on devices in the United Arab Emirates.
0

Pegasus Spyware Targets Jordanian Civil Society in Wide-Ranging Attacks

Thứ Hai, 5 tháng 2, 2024
As the Middle East nation enforces strict cybercrime laws, citizens face crackdowns on free speech with nearly three dozen journalists and lawyers targeted with the NSO Group's spyware.
0

African Cybersecurity: Facing 2024's Biggest Hurdles

Key trends in African information security this year will include biometric deployments and privacy concerns, and the rise of misinformation.
0

Name That Edge Toon: The Great Escape

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
0

Teens Committing Scary Cybercrimes, What's Behind the Trend?

Crypto theft, sextortion tactics, swattings, and ransomware: teenagers are increasingly taking up cybercrime for fun and profit — and experts credit an array of contributing factors.
0

How the SEC's Rules on Cybersecurity Incident Disclosure Are Exploited

Cyber hygiene is no longer a nice-to-have but necessary for organizations that want to survive the relentless barrage of cyberattacks being unleashed daily.
0

CISO Corner: Gen Z Challenges, CISO Liability & Cathay Pacific Case Study

Thứ Sáu, 2 tháng 2, 2024
Dark Reading's roundup of strategic cyber-operations insights for chief information security officers.
0

Myanmar Hands Over Mob Bosses in Cyber-Fraud Bust

Heads of top crime syndicates extradited to China are implicated in pig-butchering "fraud dens," but four individuals on China's most-wanted list still remain at large.
0

macOS Malware Campaign Showcases Novel Delivery Technique

Threat actor behind the Activator macOS backdoor is using pirated apps to distribute the malware in what could be a botnet-building operation.
0

Interpol's 'Synergia' Op Nabs Dozens of Cybercriminals, Zaps Global C2s

The largest number of takedowns in Africa were in South Sudan and Zimbabwe.
0

Ukraine Military Targeted With Russian APT PowerShell Attack

Thứ Năm, 1 tháng 2, 2024
The attack, associated with Shuckworm, employs TTPs observed in prior campaigns against the Ukrainian military, predominantly using PowerShell.
0

China Infiltrates US Critical Infrastructure in Ramp-up to Conflict

Threat actors linked to the People's Republic of China, such as Volt Typhoon, continue to "pre-position" themselves in the critical infrastructure of the United States, according to military and law enforcement officials.
0

FritzFrog Botnet Exploits Log4Shell on Overlooked Internal Hosts

Everyone knows to patch vulnerabilities for Internet-facing assets, but what about internal ones? One botnet is counting on your complacency.
0

The Imperative for Robust Security Design in the Health Industry

It is imperative that healthcare and health-tech companies move beyond reactive measures and adopt a proactive stance in safeguarding sensitive patient information.