Ex-NSA trio who spied on Americans for UAE now banned from arms exportsFrom hero to zero-day ... to plain zero Three former US government cyber-spies who,...
Day: September 4, 2022
Log4j vulnerabilities still an issue, but CodeSec audit can help | Contrast Security
Log4j vulnerabilities still an issue, but CodeSec audit can help | Contrast Security Landing on the incident response boards for software engineering teams worldwide in December...
Researchers Detail Emerging Cross-Platform BianLian Ransomware Attacks
Researchers Detail Emerging Cross-Platform BianLian Ransomware AttacksThe operators of the emerging cross-platform BianLian ransomware have increased their command-and-control (C2) infrastructure this month, a development that alludes...
Stop Worrying About Passwords Forever
Stop Worrying About Passwords ForeverSo far 2022 confirms that passwords are not dead yet. Neither will they be anytime soon. Even though Microsoft and Apple are...
Indian court directs chat app Telegram to disclose details of copyright infringers
Indian court directs chat app Telegram to disclose details of copyright infringersJudge says that servers being located in Singapore is not a get-out clause A ruling...
Google Chrome Bug Lets Sites Silently Overwrite System Clipboard Content
Google Chrome Bug Lets Sites Silently Overwrite System Clipboard ContentA "major" security issue in the Google Chrome web browser, as well as Chromium-based alternatives, could allow...
New Evidence Links Raspberry Robin Malware to Dridex and Russian Evil Corp Hackers
New Evidence Links Raspberry Robin Malware to Dridex and Russian Evil Corp HackersResearchers have identified functional similarities between a malicious component used in the Raspberry Robin...
Warning: PyPI Feature Executes Code Automatically After Python Package Download
Warning: PyPI Feature Executes Code Automatically After Python Package DownloadIn another finding that could expose developers to increased risk of a supply chain attack, it has...
The Ultimate Security Blind Spot You Don’t Know You Have
The Ultimate Security Blind Spot You Don't Know You HaveHow much time do developers spend actually writing code? According to recent studies, developers spend more time...
BSides Vancouver 2022 – Vivek Ponnada’s ‘OT: Air-Gap Is A Myth And Cloud Is Here To Stay!’
BSides Vancouver 2022 – Vivek Ponnada’s ‘OT: Air-Gap Is A Myth And Cloud Is Here To Stay!’Our sincere thanks to BSides Vancouver for publishing their outstanding...
Prynt Stealer Contains a Backdoor to Steal Victims’ Data Stolen by Other Cybercriminals
Prynt Stealer Contains a Backdoor to Steal Victims' Data Stolen by Other CybercriminalsResearchers discovered a private Telegram channel-based backdoor in the information stealing malware, dubbed Prynt...
Apple Releases Update for iOS 12 to Patch Exploited Vulnerability
Apple Releases Update for iOS 12 to Patch Exploited VulnerabilityThe flaw would allow the processing of maliciously crafted web content and arbitrary code executionLeer másThe flaw...
JuiceLedger Hackers Behind the Recent Phishing Attacks Against PyPI Users
JuiceLedger Hackers Behind the Recent Phishing Attacks Against PyPI UsersMore details have emerged about the operators behind the first-known phishing campaign specifically aimed at the Python Package Index...
Google Releases Urgent Chrome Update to Patch New Zero-Day Vulnerability
Google Releases Urgent Chrome Update to Patch New Zero-Day VulnerabilityGoogle on Friday shipped emergency fixes to address a security vulnerability in the Chrome web browser that...
Revealed: US telcos admit to storing, handing over location data
Revealed: US telcos admit to storing, handing over location dataLetters to FCC confirm what many believed, don't address a bigger problem US mobile carriers know a...
Samsung Admits Data Breach that Exposed Details of Some U.S. Customers
Samsung Admits Data Breach that Exposed Details of Some U.S. CustomersSouth Korean chaebol Samsung on Friday said it experienced a cybersecurity incident that resulted in the...
Log4Shell is the worst security issue of the decade: what you should do
Log4Shell is the worst security issue of the decade: what you should doLast week, we discussed the Log4Shell and other Log4j-related vulnerabilities, implications, and recommended mitigation...
Ragnar Locker Ransomware Targets Energy Sector, Cybereason Suggests
Ragnar Locker Ransomware Targets Energy Sector, Cybereason SuggestsThe malware can also check if specific products are installed, particularly security softwareLeer másThe malware can also check if...
Source Code of Over 1800 Android and iOS Apps Gives Access to AWS Credentials
Source Code of Over 1800 Android and iOS Apps Gives Access to AWS CredentialsRoughly 50% of all the apps analyzed were seen using the same AWS...
S3 Ep98: The LastPass saga – should we stop using password managers? [Audio + Text]
S3 Ep98: The LastPass saga – should we stop using password managers? [Audio + Text]Latest episode - listen now!Leer másNaked SecurityLatest episode - listen now!
Convicted felon busted for 3D printing gun parts
Convicted felon busted for 3D printing gun partsJust days after US rules tackling homemade firearms take effect A US man has admitted he broke the law...
Peter Eckersley, co-creator of Let’s Encrypt, dies at just 43
Peter Eckersley, co-creator of Let’s Encrypt, dies at just 43This site, like millions of others, has a certificate from Let's Encrypt. Farewell, Peter Eckersley, PhD, who...
Chile and Montenegro Floored by Ransomware
Chile and Montenegro Floored by RansomwareGovernments reveal system compromise in separate incidentsLeer másGovernments reveal system compromise in separate incidents
NATO Countries Hit With Unprecedented Cyber Attacks
NATO Countries Hit With Unprecedented Cyber AttacksMontenegro, Estonia and new NATO applicant Finland are just three of the countries being hit hard by sophisticated cyber attacks....
Google, YouTube ban election trolls ahead of US midterms
Google, YouTube ban election trolls ahead of US midtermsPlus: Truth Social barred from Play until it shows just one iota of decency Google and its YouTube...
UK Government Releases New AI Security Guidance
UK Government Releases New AI Security GuidanceNew principles set to take on adversarial machine learningLeer másNew principles set to take on adversarial machine learning
CISA, NSA and npm Release Software Supply Chain Guidance
CISA, NSA and npm Release Software Supply Chain GuidanceBest practices are designed to help developers bolster securityLeer másBest practices are designed to help developers bolster security
New Ransomware Group BianLian Activity Exploding
New Ransomware Group BianLian Activity ExplodingThe threat actor using the common Go programming language and a custom toolkit claims twenty victimsLeer másThe threat actor using the...
Attack infrastructure used in Cisco hack linked to Evil Corp affiliate
Attack infrastructure used in Cisco hack linked to Evil Corp affiliateResearchers discovered that the infrastructure used in Cisco hack was the same used to target a...
Will cyber‑insurance pay out? – Week in security with Tony Anscombe
Will cyber‑insurance pay out? – Week in security with Tony AnscombeWhat if your organization is hit by a cyberattack that is attributed to a nation state?...