0

AI-Driven Executive Impersonations Emerge As Significant Threat to Business Payment Processes

Thứ Tư, 31 tháng 7, 2024
0

Smart Cars Share Driver Data, Prompting Calls for Federal Scrutiny

Two US senators accuse carmakers of deceptive language and shifty practices in sharing and resale of driver data.
0

Clutch Security Launches With NHI Platform

Clutch Security is the latest cybersecurity startup looking to secure and manage non-human identity.
0

India-Linked SideWinder Group Pivots to Hacking Maritime Targets

Thứ Ba, 30 tháng 7, 2024
The nation-state espionage group known for attacking Pakistan has expanded its reach to targets in Egypt and Sri Lanka.
0

Criminal Hackers Add GenAI Credentials to Underground Markets

According to the study, around 400 stolen GenAI credentials are being sold by threat actors per day.
0

Ransomware Gangs Exploit ESXi Bug for Instant, Mass Encryption of VMs

With sufficient privileges in Active Directory, attackers only have to create an "ESX Admins" group in the targeted domain and add a user to it.
0

Heimdal Security Presents its Latest Report on Brute-Force Cyberattacks

Thứ Hai, 29 tháng 7, 2024
0

Microsoft Lowballs CrowdStrike Outage Impact

Microsoft says that its initial estimate of 8.5 million PCs affected was only a subset of the affected number of machines in the crash.
0

'Zeus' Hacker Group Strikes Israeli Olympic Athletes in Data Leak

Security presence has been heightened in Paris to ensure that the Games are safe, and Israeli athletes have been provided with even more protection.
0

OAuth+XSS Attack Threatens Millions of Web Users With Account Takeover

An attack flow that combines API flaws within "log in with" implementations and Web injection bugs could affect millions of websites.
0

7 Sessions Not to Miss at Black Hat USA 2024

This year's conference will be a treasure trove of insights for cybersecurity professionals.
0

Targeted PyPi Package Steals Google Cloud Credentials from macOS Devs

Thứ Sáu, 26 tháng 7, 2024
The campaign is laser-targeted, bucking the trend of "spray-and-pray" malicious open source packages turning up in code repositories seemingly every other day.
0

CrowdStrike Outage Losses Estimated at a Staggering $5.4B

Researchers track the healthcare sector as experiencing the biggest financial losses, with banking and transportation following close behind.
0

US Offers $10M Reward for Information on North Korean Hacker

The individual is part of a DPRK-backed group known as Andariel, which is known for using the 'Maui' ransomware strain to target and extort healthcare entities.
0

Nvidia Embraces LLMs & Commonsense Cybersecurity Strategy

Nvidia doesn't just make the chips that accelerate a lot of AI applications — the company regularly creates and uses its own large language models, too.
0

Feds Warn of North Korean Cyberattacks on US Critical Infrastructure

Thứ Năm, 25 tháng 7, 2024
The Andariel group is targeting critical defense, aerospace, nuclear, and engineering companies for data theft, the FBI, NSA, and others said.
0

Microsoft's Internet Explorer Gets Revived to Lure in Windows Victims

Though IE was officially retired in June 2022, the vulnerability ramped up in January 2023 and has been going strong since.
0

Unexpected Lessons Learned From the CrowdStrike Event

How your organization can leverage the disruptive CrowdStrike update to become more resilient.
0

Fighting Third-Party Risk With Threat Intelligence

Thứ Tư, 24 tháng 7, 2024
With every new third-party provider and partner, an organization's attack surface grows. How, then, do enterprises use threat intelligence to enhance their third-party risk management efforts?
0

'Stargazer Goblin' Amasses Rogue GitHub Accounts to Spread Malware

The threat group uses its "Stargazers Ghost Network" to star, fork, and watch malicious repos to make them seem legitimate, all to distribute a variety of notorious information-stealers-as-a-service.
0

Cyberattackers Exploit Microsoft SmartScreen Bug in Stealer Campaign

The good news: Only organizations far behind on standard Windows patching have anything to worry about.
0

Hamster Kombat Players Threatened by Spyware & Infostealers

Players can only access the game by first joining its Telegram channel, with some going astray in copycat channels with hidden malware.
0

China's 'Evasive Panda' APT Spies on Taiwan Targets Across Platforms

Thứ Ba, 23 tháng 7, 2024
The cohort's variety of individual tools covers just about any operating system it could possibly wish to attack.
0

Goodbye? Attackers Can Bypass 'Windows Hello' Strong Authentication

Accenture researcher undercut WHfB's default authentication using open source Evilginx adversary-in-the-middle (AitM) reverse-proxy attack framework.
0

Sprawling CrowdStrike Incident Mitigation Showcases Resilience Gaps

A painful recovery from arguably one of the worst IT outages ever continues, and the focus is shifting to what can be done to prevent something similar from happening again.
0

Threat Hunting Market Worth $6.9B by 2029

Thứ Hai, 22 tháng 7, 2024
0

Russian Hacktivists Sanctioned for US Critical Infrastructure Attacks

"CARR" hackers have managed to gain control over ICS and SCADA systems in the US and Europe.
0

Kaspersky Is an Unacceptable Risk Threatening the Nation's Cyber Defense

As geopolitical tensions rise, foreign software presents a grave supply chain risk and an ideal attack vector for nation-state adversaries.
0

Chinese Forced-Labor Ring Sponsors Football Clubs, Hides Behind Stealth Tech

An illegal gambling empire fueled by modern-day slavery is being propped up by high-profile sponsorships — and defended with sophisticated anti-detection software.
0

Fallout From Faulty Friday CrowdStrike Update Persists

Historic IT outage expected to spur regulatory scrutiny, soul-searching over "monoculture" of IT infrastructure - and cyberattack threats.
0

Under-Resourced Maintainers Pose Risk to Africa's Open Source Push

Chủ Nhật, 21 tháng 7, 2024
Many nations see open source software as a great equalizer, giving the Global South the tools necessary for sustainable development. But recent supply chain attacks highlight the need for security.
0

Buggy CrowdStrike EDR Update Crashes Windows Systems Worldwide

Thứ Sáu, 19 tháng 7, 2024
Though the cybersecurity vendor has since reverted the update, chaos continues as companies continue to struggle to get back up and running.
0

US Data Breach Victim Numbers Increase by 1,000%, Literally

Thứ Năm, 18 tháng 7, 2024
Though the number of victims has risen, the actual number of breaches has gone down, as fewer, bigger breaches affect more individuals.
0

High-Severity Cisco Bug Grants Attackers Password Access

The vulnerability was given the highest CVSS score possible, though few details have been released due to its severity.
0

Microsoft-Signed Chinese Adware Opens the Door to Kernel Privileges

An official stamp of approval might give the impression that a purported "HotPage" adtech tool is not, in fact, a dangerous kernel-level malware — but that's just subterfuge.
0

Aura Partners With Mosaic Compliance Services to Launch a Program to Protect Auto Dealers and Buyers From Cybercrime

Thứ Tư, 17 tháng 7, 2024
0

DPRK Hackers Tweak Malware to Lure MacOS Users into Video Calls

North Korean espionage campaign delivers updated BeaverTail info stealer by spoofing legitimate video calling service, researcher finds.
0

West African Crime Syndicate Taken Down by Interpol Operation

Law enforcement managed to arrest numerous members of Black Axe, a notorious group engaged in a wide variety of criminal activity.
0

Microsoft: Scattered Spider Widens Web With RansomHub & Qilin

Thứ Ba, 16 tháng 7, 2024
The gang already uses varied tools in its attacks, such as phishing, SIM swapping, and MFA fatigue.
0

Name That Toon: Near Miss

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
0

'Trial' DDoS Attacks on French Sites Portend Greater Olympics Threats

Thứ Hai, 15 tháng 7, 2024
Russian hacktivists claim DDoS attacks against basic tourist websites. Is it real, or just smoke and mirrors?
0

SEXi Ransomware Rebrands as 'APT Inc.,' Keeps Old Methods

The cybercrime group demands ransoms of varying degrees, from thousands to even millions of dollars — in some cases, 2 bitcoin per encrypted customer.
0

Well-Established Cybercriminal Ecosystem Blooming in Iraq

A malicious Telegram bot is the key to a veritable flourishing garden of nefarious cybercriminal activity, which was discovered via a series of Python packages.
0

Rite Aid Becomes RansomHub's Latest Victim After Data Breach

The breach affects older customer information involved in purchases made from June 6, 2017, up until July 30, 2018.
0

How Manufacturers Can Secure Themselves Against Cyber Threats

Good risk management is necessary to protect customers, ensure operational continuity, safeguard intellectual property, and maintain fiscal responsibility.
0

7 Tips for Navigating Cybersecurity Risks in M&As

Careful planning and proactive measures can ensure smooth and secure transitions, paving the way for a successful merger or acquisition.
0

AT&T Breach May Also Impact Millions of Boost, Cricket, H2O Customers

Thứ Sáu, 12 tháng 7, 2024
In the scrum, countless call and text records leaked, other cell companies caught strays, the DoJ became involved, and someone has already been arrested.
0

CISA, FBI Warn of OS Command-Injection Vulnerabilities

Agencies say flaws are preventable and can be addressed with secure-by-design principles.
0

Apple Warns iPhone Users in 98 Countries of More Spyware Attacks

Thứ Năm, 11 tháng 7, 2024
Users receiving the warnings are likely being targeted based on who they are or what they do, according to the vendor.
0

Advance Auto Parts Data Breach Affects 2.3M Customers

Threat actors had access to the automotive provider's networks for more than a month before they were discovered.
0

FishXProxy Phishing Kit Outfits Cybercriminals for Success

A new end-to-end toolkit circulating on the Dark Web significantly lowers the barrier to entry for creating sophisticated campaigns that can avoid most traditional security detection and protection systems.
0

Saviynt Expands Capabilities With EY Alliance, Elevating Approach to External User Management With its Identity Cloud

Thứ Tư, 10 tháng 7, 2024
0

Attackers Have Been Leveraging Microsoft Zero-Day for 18 Months

Likely two separate threat actors are using the just-patched CVE-2024-38112 in targeted, concurrent infostealer campaigns.
0

Feds Uncover Sprawling, GenAI-Enabled Russian Troll Farm

The bot farm was created using AI-enhanced software that was able to create a host of different false personas to spread disinformation in convincing and unsettling ways.
0

Attackers Already Exploiting Flaws in Microsoft's July Security Update

Thứ Ba, 9 tháng 7, 2024
In all, the company released fixes for a whopping 139 CVEs in its own products and four for non-Microsoft products.
0

Evolve Bank & Trust Reveals 7M Impacted in LockBit Breach

Though the company reassures its users that customer funds were not accessed, the same cannot be said for customer information.
0

Chinese Threat Group APT40 Exploits N-Day Vulns at Rapid Pace

The state-sponsored threat group is capable of exploiting fresh software vulnerabilities within hours of their initial discovery.
0

10B Passwords Pop Up on Dark Web 'RockYou2024' Release

Thứ Hai, 8 tháng 7, 2024
The passwords, dumped on a cyber-underground forum on July 4 by a hacker called "ObamaCare," were collected from a variety of older and more recent breaches.
0

Apple Geolocation API Exposes Wi-Fi Access Points Worldwide

Beyond the devices that use them, Wi-Fi hubs themselves can leak interesting data, thanks to some quirks in Apple's geolocation system.
0

Cyber-Insurance Prices Plummet as Market Competition Grows

Now may be a good time to find good deals on insurance coverage for ransomware and security incidents.
0

Deconstructing Security Assumptions to Ensure Future Resilience

By breaking down fundamental assumptions, we can proactively plan for, and begin to achieve, future resilience.
0

5 Ways to Run Security as a Meritocracy

Actions speak louder than words. Here are five tips for encouraging a security culture based on achievements.
0

Euro Vishing Fraudsters Add Physical Intimidation to Arsenal

Thứ Sáu, 5 tháng 7, 2024
The persistent threat of social engineering tactics sees cybercriminals blending technology with human manipulation to exploit individuals.
0

Are SOC 2 Reports Sufficient for Vendor Risk Management?

SOC 2 reports are a valuable tool for evaluating vendor security, but they shouldn't be the only piece of the puzzle.
0

Euro 2024 Becomes Latest Sporting Event to Attract Cyberattacks

Cybercriminals are selling credentials linked to the tournament on underground markets, with some geopolitics playing out in denial-of-service attacks.
0

A CISO's Guide to Avoiding Jail After a Breach

Yahoo, Uber, SolarWinds — increasingly, the government is incentivizing better corporate security by punishing the individuals leading it. Is that a good idea? And how can security pros avoid ending up on the butt end of a lawsuit?
0

Any IoT Device Can Be Hacked, Even Grills

Thứ Tư, 3 tháng 7, 2024
Researchers uncover a way to hack the summer cookout — but firmware updates will stop that grilled meat (or tofu) from turning into an inedible mess.
0

Bay Area Credit Union Struggles to Recover After Ransomware Attack

Tens of thousands of Patelco customers remain without access to their accounts, with no estimates for when systems will be restored.
0

Hacker Busted for 'Evil Twin' Wi-Fi That Steals Airline Passenger Data

Australian cops arrest man found with a portable Wi-Fi access device in his carry-on luggage, allegedly used for standing up scam Wi-Fi networks on flights.
0

Networking Without the Hangover

How Sober in Cyber is redefining professional connections in the security industry.
0

Google Opens $250K Bug Bounty Contest for VM Hypervisor

Thứ Hai, 1 tháng 7, 2024
If security researchers can execute a guest-to-host attack using a zero-day vulnerability in the KVM open source hypervisor, Google will make it worth their while.
0

Prudential Data Breach Victim Count Soars to 2.5M

The company seemingly underestimated the severity of the breach after originally providing a head count of roughly 36,000 impacted individuals.
0

Juniper Rushes Out Emergency Patch for Critical Smart Router Flaw

Although not yet exploited in the wild, the max-critical authentication bypass bug could allow adversaries to take over unpatched Juniper Session Smart Routers and Conductors, and WAN Assurance Routers, the company warns.
0

Thinking About Security, Fast & Slow

To be effective, managing risk demands both fast responses and strategic thinking.