0

UN Peace Operations Under Fire From State-Sponsored Hackers

Thứ Sáu, 29 tháng 3, 2024
The international body isn't doing enough to protect details on dissidents and activists gathered by peacekeeping operations, particularly across Central Africa.
0

Cloud Email Filtering Bypass Attack Works 80% of the Time

A majority of enterprises that employ cloud-based email spam filtering services are potentially at risk, thanks to a rampant tendency to misconfigure them.
0

TheMoon Malware Rises Again with Malicious Botnet for Hire

Outdated SOHO routers and IoT devices being hijacked by TheMoon to operate an anonymous hacker botnet service called Faceless.
0

Iran's Evolving Cyber-Enabled Influence Operations to Support Hamas

Understanding Iran's techniques, coupled with comprehensive threat intel, can give organizations an edge in identifying and defending against these attacks.
0

Pervasive LLM Hallucinations Expand Code Developer Attack Surface

Thứ Năm, 28 tháng 3, 2024
The tendency of popular AI-based tools to recommend nonexistent code libraries offers a bigger opportunity than thought to distribute malicious packages.
0

Indian Government, Oil Companies Breached by 'HackBrowserData'

The malicious actor used Slack channels as an exfiltration point to upload the stolen data.
0

Threat Report: Examining the Use of AI in Attack Techniques

Thứ Tư, 27 tháng 3, 2024
More than ever, it's critical for organizations to understand the nature of AI-based threats and how they can blunt the advantage that AI conveys to bad actors.
0

Vietnam Securities Broker Suffered Cyberattack That Suspended Trading

Attackers "encrypted" VNDirect's data in an attack that kept the broker offline for days.
0

'Tycoon' Malware Kit Bypasses Microsoft, Google MFA

Threat actors are widely adopting the fast-growing, low-cost phishing-as-a-service (PhaaS) platform, which is sold via Telegram.
0

'Darcula' Phishing-as-a-Service Operation Bleeds Victims Worldwide

Pervasive and inexpensive phishing kit encompasses hundreds of templates targeting Kuwait Post, Etisalat, Jordan Post, Saudi Post. Australia Post, Singapore Post, and postal services in South Africa, Nigeria, Morocco, and more.
0

Australian Government Doubles Down On Cybersecurity in Wake of Major Attacks

Thứ Ba, 26 tháng 3, 2024
Government proposes more modern and comprehensive cybersecurity regulations for businesses, government, and critical infrastructures providers Down Under.
0

Worldwide Agenda Ransomware Wave Targets VMware ESXi Servers

A new, improved variant on the group's malware combines fileless infection, BYOVD, and more to cause havoc in virtual environments.
0

Apple Security Bug Opens iPhone, iPad to RCE

CVE-2024-1580 allows remote attackers to execute arbitrary code on affected devices.
0

UN Adopts Largely Symbolic Resolution for 'Secure, Trustworthy' AI

Thứ Hai, 25 tháng 3, 2024
Countries around the world are signaling support of secure AI practices, but not necessarily committing to them.
0

A Database-Oriented Operating System Wants to Shake Up Cloud Security

The operating system, DBOS, natively uses a relational database to reduce cost, ease application development, and maintain cybersecurity and integrity.
0

CISA Seeks to Curtail 'Unforgivable' SQL Injection Defects

In a joint alert with the FBI, CISA seeks to tamp down the pervasiveness of a well-known class of bugs.
0

Mitigating Third-Party Risk Requires a Collaborative, Thorough Approach

The issue can seem daunting, but most organizations have more agency and flexibility to deal with third-party risk than they think.
0

Japan Runs Inaugural Cyber Defense Drills with Pacific Island Nations

Kiribati, the Marshall Islands, Micronesia, Nauru, and Palau participate in the cybersecurity exercise held in Guam.
0

GitHub Developers Hit in Complex Supply Chain Cyberattack

The attacker employed various techniques, including distributing malicious dependencies via a fake Python infrastructure linked to GitHub projects.
0

Russian APT Releases More Deadly Variant of AcidRain Wiper Malware

Thứ Sáu, 22 tháng 3, 2024
New AcidPour variant can attack a significantly broader range of targets including IoT devices, storage area networks, and handhelds.
0

AWS CISO: Pay Attention to How AI Uses Your Data

Amazon Web Services CISO Chris Betz explains why generative AI is both a time-saving tool as well as a double-edged sword.
0

Apple Stingy With Details About Latest iOS Update

The security update comes just weeks after the release of iOS 17.4, but Apple has not included CVEs or information about the fixes.
0

NIST's Vuln Database Downshifts, Prompting Questions About Its Future

Thứ Năm, 21 tháng 3, 2024
NVD may be in peril, and while alternatives exist, enterprise security managers will need to plan accordingly to stay on top of new threats.
0

How Can We Reduce Threats From the Initial Access Brokers Market?

The ready-made access IABs offer has become an integral part of the ransomware ecosystem. Here's how to stop them before they can profit from your assets.
0

300K Internet Hosts at Risk for 'Devastating' Loop DoS Attack

Attackers can create a self-perpetuating, infinite scenario in such a way that volumes of traffic overwhelm network resources indefinitely.
0

1-Click Takeover Bug in AWS Apache Airflow Reveals Larger Risk

A bug exposed users of an AWS workflow management service to cookie tossing, but behind the scenes lies an even deeper issue that runs across all of the top cloud services.
0

Kaspersky Identifies Three New Android Malware Threats

Thứ Tư, 20 tháng 3, 2024
0

India's Android Users Hit by Malware-as-a-Service Campaign

Hackers are seeking sensitive personal information on user devices, including banking data and SMS messages.
0

5 Ways CISOs Can Navigate Their New Business Role

Thứ Ba, 19 tháng 3, 2024
CISOs can successfully make their business operations more secure and play a larger role in the organization's overall strategy, but there are pitfalls to avoid, Forrester analysts warn.
0

Name That Toon: Bridge the Gap

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
0

New Regulations Make D&O Insurance a Must for CISOs

CISOs currently hold all of the responsibility to stop cyberattacks yet have none of the authority to fund the technological defenses that regulations require.
0

Chinese APT 'Earth Krahang' Compromises 48 Gov't Orgs on 5 Continents

Thứ Hai, 18 tháng 3, 2024
The group uses pretty standard open source tooling and social engineering to burrow into high-level government agencies across the globe.
0

Fujitsu: Malware on Company Computers Exposed Customer Data

It remains unclear how long the IT services giant's systems were infiltrated and just how the cyberattack unfolded.
0

Tracking Everything on the Dark Web Is Mission Critical

On the Dark Web, stolen secrets are your enemy, and context is your friend.
0

South African Government Pension Data Leak Fears Spark Probe

LockBit ransomware gang claims 668GB of data it dumped online was stolen from South Africa's pension agency.
0

3 Ways Businesses Can Overcome the Cybersecurity Skills Shortage

Chủ Nhật, 17 tháng 3, 2024
With budget constraints and a limited supply of skilled talent, businesses need to get creative to defend against rampant cybersecurity threats.
0

'GhostRace' Speculative Execution Attack Impacts All CPU, OS Vendors

Thứ Sáu, 15 tháng 3, 2024
Like Spectre, the new GhostRace exploit could give attackers a way to access sensitive information from system memory and take other malicious actions.
0

NHS Breach, HSE Bug Expose Healthcare Data in the British Isles

Whoopsies in Ireland and Scotland speak to a tenuousness of cyber protections for sensitive private healthcare data.
0

FCC Approves Voluntary Cyber Trust Labels for Consumer IoT Products

Thứ Năm, 14 tháng 3, 2024
Here's what IoT device manufacturers need to know to earn a cybersecurity stamp of approval from the government.
0

Fortinet Warns of Yet Another Critical RCE Flaw

CVE-2024-48788, like many other recent Fortinet flaws, will likely be an attractive target, especially for nation-state backed actors.
0

Alabama Under DDoS Cyberattack by Russian-Backed Hacktivists

The hacktivist group Anonymous Sudan claims credit for a cyberattack that disrupted Alabama state government earlier this week.
0

TikTok Ban Raises Data Security, Control Questions

Approved by the House and moving on to the Senate, the potential ban points up the porousness of governmental control in the digital age.
0

Nissan Oceania Breached; 100K People Affected Down Under

Thứ Tư, 13 tháng 3, 2024
A possible ransomware attack has exposed government and personal data of Australians and New Zealanders, encompassing the carmaker's customers, dealers, and employees.
0

How to Identify a Cyber Adversary: What to Look For

There are many factors involved in attributing a cyber incident to a specific threat actor.
0

Patch Now: Kubernetes RCE Flaw Allows Full Takeover of Windows Nodes

Attackers can remotely execute code with system privileges by exploiting a vulnerability in the source code of the open source container management system.
0

Google's Post-Quantum Upgrade Doesn't Mean We're All Protected Yet

Thứ Ba, 12 tháng 3, 2024
Just because Google has put in the work to quantum-proof Chrome doesn't mean post-quantum security is all set.
0

Microsoft Discloses Critical Hyper-V Flaws in Low-Volume Patch Update

Microsoft has disclosed fewer flaws and zero-days in the first three months of 2024 compared with the first quarter of the prior four years.
0

'Magnet Goblin' Exploits Ivanti 1-Day Bug in Mere Hours

A prolific but previously hidden threat actor turns public vulnerabilities into working exploits before companies have time to patch.
0

Typosquatting Wave Shows No Signs of Abating

Thứ Hai, 11 tháng 3, 2024
A spate of recent typosquatting attacks show the scourge of this type of attack is still very much with us, even after decades of cyberdefender experience with it.
0

4 Security Tips From PCI DSS 4.0 Anyone Can Use

With the final switchover to the latest version of the credit card standard, here's what all security professionals can draw from the changes.
0

Anti-Fraud Project Boosts Security of African, Asian Financial Systems

Working with countries and organizations in Africa, Asia, and the Middle East, the Tazama project aims to add affordable security and trust to the financial infrastructure.
0

How Not to Become the Target of the Next Microsoft Hack

The alarming number of cyber threats targeting Microsoft cloud applications shows cybersecurity needs an overhaul.
0

Japan Blames North Korea for PyPI Supply Chain Cyberattack

Chủ Nhật, 10 tháng 3, 2024
Open-source software ecosystem compromise leaves developers in Asia and around the globe at risk.
0

Broke Cyber Pros Flock to Cybercrime Side Hustles

Thứ Sáu, 8 tháng 3, 2024
Burned-out cybersecurity professionals dealing with layoffs and stressful working conditions are increasingly finding a better way to earn a buck: cybercrime.
0

South Korean Police Deploy Deepfake Detection Tool in Run-up to Elections

The nation's battle with political deepfakes may be a harbinger for what's to come in elections around the world this year.
0

Stealth Bomber: Atlassian Confluence Exploits Drop Web Shells In-Memory

The proof-of-concept exploits for Atlassian Confluence would enable arbitrary code execution without requiring file system access.
0

Silence Laboratories Raises $4.1M Funding to Enable Privacy Preserving Collaborative Computing

Thứ Năm, 7 tháng 3, 2024
0

Bipartisan Members of Congress Introduce Enhanced Cybersecurity for SNAP Act to Secure Food Benefits Against Hackers and Thieves

0

'The Weirdest Trend in Cybersecurity': Nation-States Returning to USBs

USBs are fetch again, as major APTs from Russia, China, and beyond are turning to them for BYOD cyberattacks.
0

How CISA Fights Cyber Threats During Election Primary Season

Election cyber threats come from various places, including compromised voting machines, AI deepfakes, and potential physical harm to workers. But CISA has been working diligently with various public and private partners to stymie the risk.
0

Veeam Launches Veeam Data Cloud

Thứ Tư, 6 tháng 3, 2024
0

Patch Now: Apple Zero-Day Exploits Bypass Kernel Security

A pair of critical bugs could open the door to complete system compromise, including access to location information, iPhone camera and mic, and messages. Rootkitted attackers could theoretically perform lateral movement to corporate networks, too.
0

Spoofed Zoom, Google & Skype Meetings Spread Corporate RATs

A Russian-language campaign aims to compromise corporate users on both Windows and Android devices by mimicking popular online collaboration applications.
0

Army Vet Spills National Secrets to Fake Ukrainian Girlfriend

Thứ Ba, 5 tháng 3, 2024
The retired US Army lieutenant colonel faces up to 10 years in prison if convicted of sharing secret information about the Russia-Ukraine war with a scammer posing as romantic connection.
0

North Korea Hits ScreenConnect Bugs to Drop 'ToddleShark' Malware

North Korea's latest espionage tool is tough to pin down, with random generators that throw detection mechanisms off its scent. The DPRK is using the recent critical bugs in ConnectWise ScreenConnect, a remote desktop tool, to deliver the bug.
0

Improved, Stuxnet-Like PLC Malware Aims to Disrupt Critical Infrastructure

A newly developed PLC malware does not require physical access to target an ICS environment, is mostly platform neutral, and is more resilient than traditional malware aimed at critical infrastructure.
0

Fast-Growing RA Ransomware Group Goes Global

The rapidly evolving threat group uses high-impact tactics that include manipulating group policy to deploy payloads across environments.
0

Zero-Click GenAI Worm Spreads Malware, Poisoning Models

Thứ Hai, 4 tháng 3, 2024
35 years after the Morris worm, we're still dealing with a version of the same issue: data overlapping with control.
0

Amex Customer Data Exposed in Third-Party Breach

The breach occurred through a third-party service provider frequently used by the company's travel services division.
0

Middle East Leads in Deployment of DMARC Email Security

Yet challenges remain as many nation's policies for the email authentication protocol remain lax and could run afoul of Google's and Yahoo's restrictions.
0

'Illusive' Iranian Hacking Group Ensnares Israeli, UAE Aerospace and Defense Firms

UNC1549, aka Smoke Sandstorm and Tortoiseshell, appears to be the culprit behind a cyberattack campaign customized for each targeted organization.
0

Taiwan's Biggest Telco Breached by Suspected Chinese Hackers

Thứ Sáu, 1 tháng 3, 2024
Stolen data from Chunghwa Telecom — including government-related details — are up for sale on the Dark Web, the Taiwanese defense ministry confirms.
0

NIST Cybersecurity Framework 2.0: 4 Steps To Get Started

The National Institute of Standards and Technology (NIST) has revised the book on creating a comprehensive cybersecurity program that aims to help organizations of every size be more secure. Here's where to start putting the changes into action.
0

CryptoChameleon Attackers Target Apple, Okta Users With Tech Support Gambit

A sophisticated threat actor using an MO similar to Scattered Spider is camouflaging itself with convincing impersonation techniques in targeted attacks.
0

Biometrics Regulation Heats Up, Portending Compliance Headaches

A growing thicket of privacy laws regulating biometrics is aimed at protecting consumers amid increasing cloud breaches and AI-created deepfakes. But for businesses that handle biometric data, staying compliant is easier said than done.