Will cyber‑insurance pay out? – Week in security with Tony AnscombeWhat if your organization is hit by a cyberattack that is attributed to a nation state?...
Day: September 4, 2022
Google Chrome issue allows overwriting the clipboard content
Google Chrome issue allows overwriting the clipboard contentA security issue in the Google Chrome browser could allow malicious web pages to automatically overwrite clipboard content. A...
Experts link Raspberry Robin Malware to Evil Corp cybercrime gang
Experts link Raspberry Robin Malware to Evil Corp cybercrime gangResearchers attribute the Raspberry Robin malware to the Russian cybercrime group known as Evil Corp group. IBM...
Google Chrome Vulnerability Lets Sites Quietly Overwrite Clipboard Contents
Google Chrome Vulnerability Lets Sites Quietly Overwrite Clipboard ContentsThe bug was discovered by developer Jeff Johnson, who detailed his findings in a blog postLeer másThe bug...
Another Ransomware For Linux Likely In Development
Another Ransomware For Linux Likely In DevelopmentUptycs researchers recently spotted a new Linux ransomware that appears to be under active development. The Uptycs Threat Research team...
US Police Deployed Obscure Smartphone Tracking Tool With No Warrants
US Police Deployed Obscure Smartphone Tracking Tool With No WarrantsIt would allow police to search billions of mobile device-based records, including GPS dataLeer másIt would allow...
The Prynt Stealer malware contains a secret backdoor. Crooks steal data from other cybercriminals
The Prynt Stealer malware contains a secret backdoor. Crooks steal data from other cybercriminalsThe information-stealing malware Prynt Stealer contains a backdoor that allows stealing the data...
Google rolled out emergency fixes to address actively exploited Chrome zero-day
Google rolled out emergency fixes to address actively exploited Chrome zero-dayGoogle rolled out emergency fixes to address a vulnerability in the Chrome web browser that is...
Samsung discloses a second data breach this year
Samsung discloses a second data breach this yearElectronics giant Samsung has confirmed a new data breach after some of its US systems were compromised in July....
Security Affairs newsletter Round 382
Security Affairs newsletter Round 382A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in...
Alleged Iranian threat actors leak the code of their CodeRAT malware
Alleged Iranian threat actors leak the code of their CodeRAT malwareThe author of the remote access trojan (RAT) CodeRAT has leaked the source code of its...
IRS mistakenly published confidential info for roughly 120K taxpayers
IRS mistakenly published confidential info for roughly 120K taxpayersThe Internal Revenue Service (IRS) mistakenly leaked confidential information for approximately 120,000 taxpayers. Bad news for approximately 120,000...
A New Cyberattack on TAP Air Portugal
A New Cyberattack on TAP Air PortugalOn Thursday night, August 25, TAP Air Portugal was the victim of a cyberattack claimed by the Ragnar Locker ransomware...
Weekly Update 311
Weekly Update 311Well, after a crazy amount of work, a lot of edits, reflection, and feedback cycles, "Pwned" is almost here: This better be a sizzling...
Linux Systems Are a More Common Target as the Attack Surface Expands
Linux Systems Are a More Common Target as the Attack Surface ExpandsOften overlooked by security experts, Linux systems become a more common target for cybercriminals. Aiming...
AgentTesla Spyware Massively Distributed in Phishing Campaigns Targeting Ukrainian, Austrian, and German Organizations
AgentTesla Spyware Massively Distributed in Phishing Campaigns Targeting Ukrainian, Austrian, and German Organizations On August 30 and 31, 2022, CERT-UA revealed a burst of adversary activity...
Anomaly Detection In Cybersecurity For Dummies
Anomaly Detection In Cybersecurity For DummiesThe pandemic has changed the way businesses operate, and one of these changes is that companies across the […] The post...
Source Code Protection Market
Source Code Protection MarketDo we need backup software for DevOps ecosystems? By Marta Przybylska, Marketing Manager, GitProtect.io / Xopero Software […] The post Source Code...
EVERYONE is Part of the Security Team and Solution
EVERYONE is Part of the Security Team and SolutionBy Jim Nitterauer, Director of Information Security, Graylog Often, companies approach cybersecurity as a technology problem, forgetting that...
The Future of Cybersecurity in SaaS
The Future of Cybersecurity in SaaSBy Sean Malone, Chief Information Security Officer, Demandbase Security for Software-as-a-Service (SaaS) solutions has been a priority since […] The post...
ModernLoader Bot Detection: Spreads via Bogus Amazon Gift Cards, Compromises Users in Eastern Europe
ModernLoader Bot Detection: Spreads via Bogus Amazon Gift Cards, Compromises Users in Eastern Europe ModernLoader bot, aka Avatar bot, is a .NET remote access trojan with...
Over 900K Kubernetes clusters are misconfigured! Is your cluster a target?
Over 900K Kubernetes clusters are misconfigured! Is your cluster a target?Graham Cluley Security News is sponsored this week by the folks at Teleport. Thanks to the...
FBI issues warning after crypto-crooks steal $1.3 billion in just three months
FBI issues warning after crypto-crooks steal $1.3 billion in just three monthsAmid a wave of hacks which has cost investors billions of dollars worth of cryptocurrency,...
Clever Phishing Scam Uses Legitimate PayPal Messages
Clever Phishing Scam Uses Legitimate PayPal MessagesBrian Krebs is reporting on a clever PayPal phishing scam that uses legitimate PayPal messaging. Basically, the scammers use the...
Montenegro is the Victim of a Cyberattack
Montenegro is the Victim of a CyberattackDetails are few, but Montenegro has suffered a cyberattack: A combination of ransomware and distributed denial-of-service attacks, the onslaught disrupted...
Friday Squid Blogging: Squid Images
Friday Squid Blogging: Squid ImagesiStock has over 13,000 royalty-free images of squid. As usual, you can also use this squid post to talk about the security...
Smartphone Alternatives: Ease Your Way into Your Child’s First Phone
Smartphone Alternatives: Ease Your Way into Your Child’s First Phone “But everyone else has one.” Those are familiar words to a parent, especially if you’re having...
Summertime Blues: TA558 Ramps Up Attacks on Hospitality, Travel Sectors
Summertime Blues: TA558 Ramps Up Attacks on Hospitality, Travel SectorsContenido de la entradaLeer másProofpoint News Feed
New Golang Ransomware Agenda Customizes Attacks
New Golang Ransomware Agenda Customizes AttacksA new piece of ransomware written in the Go language has been targeting healthcare and education enterprises in Asia and Africa....
Buzzing in the Background: BumbleBee, a New Modular Backdoor Evolved From BookWorm
Buzzing in the Background: BumbleBee, a New Modular Backdoor Evolved From BookWormIn March 2021, we investigated a backdoor with a unique modular architecture and called it...