The White House's global ransomware summit couldn't come at a better timeAs cyber threats ramp up, businesses and organizations will be hoping for more than platitudes...
Month: November 2022
Safeguards Rule: 9 Steps to Compliance for Auto Dealerships
Safeguards Rule: 9 Steps to Compliance for Auto DealershipsAutomobile dealerships collect and store large amounts of consumer data, including Social Security numbers, bank account information, and...
Ordinary web access request or command to malware?
Ordinary web access request or command to malware?Cranefly group unleashes nasty little technique using Microsoft Internet Information Services (IIS) logs A threat group that targets corporate...
CISA releases cybersecurity performance goals to reduce risk and impact of adversarial threats
CISA releases cybersecurity performance goals to reduce risk and impact of adversarial threatsLast week, the US Cybersecurity and Infrastructure Security Agency (CISA) released voluntary cross-sector Cybersecurity...
Nearly a Third of Cybersecurity Leaders Considering Quitting
Nearly a Third of Cybersecurity Leaders Considering QuittingResearch commissioned by BlackFog shows that work life balance is most disliked part of the job for cybersecurity leaders....
Unofficial fix emerges for Windows bug abused to infect home PCs with ransomware
Unofficial fix emerges for Windows bug abused to infect home PCs with ransomwareBroken code signature? LGTM, says Microsoft OS A cybersecurity firm has issued another unofficial...
India’s Home Ministry cracks down on predatory lending apps following suicides
India's Home Ministry cracks down on predatory lending apps following suicidesLocal media say they're China backed, Ministry only mentions organized crime India's Home Ministry has asked...
Education tech giant gets an F for security after sensitive info on 40 million users stolen
Education tech giant gets an F for security after sensitive info on 40 million users stolenChegg it out: Four blunders in four years Sloppy data security...
German cops arrest student suspected of running infamous dark-web souk
German cops arrest student suspected of running infamous dark-web soukDeutschland im Deep Web destroyed A 22-year-old student German federal police believe to be the administrator of...
Engineering workstation attacks on industrial control systems double: Report
Engineering workstation attacks on industrial control systems double: ReportEngineering workstation compromises were the initial attack vector in 35% of all operational technology (OT) and industrial control...
On Demand Subscription: Drive Immediate Value From SOC Prime Platform
On Demand Subscription: Drive Immediate Value From SOC Prime Platform A community-driven approach based on Detection-as-Code principles and cutting-edge technology leveraging Sigma language and MITRE ATT&CK®...
CVE-2022-40684 Detection: A Critical Fortinet Authentication Bypass Vulnerability Exploited in the Wild
CVE-2022-40684 Detection: A Critical Fortinet Authentication Bypass Vulnerability Exploited in the Wild Heads up! A new critical vulnerability is on the radar. Fortinet has recently disclosed...
Air New Zealand warns of an ongoing credential stuffing attack
Air New Zealand warns of an ongoing credential stuffing attackAir New Zealand suffered a security breach, multiple customers have been locked out of their accounts after...
Russia Suspected in Truss Phone Hacking Scandal
Russia Suspected in Truss Phone Hacking ScandalOne year’s worth of messages reportedly downloaded from former PM’s deviceLeer másOne year’s worth of messages reportedly downloaded from former...
Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween
Trick or treat? Stay so cyber‑safe it’s scary – not just on HalloweenGather around, folks, to learn about some of the ghastliest tricks used by criminals online...
BlackByte ransomware group hit Asahi Group Holdings, a precision metal manufacturing and metal solution provider
BlackByte ransomware group hit Asahi Group Holdings, a precision metal manufacturing and metal solution providerThe BlackByte ransomware group claims to have compromised Asahi Group Holdings, a precision metal...
Hackers Target Australian Defense Communications Platform With Ransomware
Hackers Target Australian Defense Communications Platform With RansomwareThe firm is one of the defense department's external providers employed to run one of its websitesLeer másThe firm...
Europe’s Biggest Copper Producer Hit by Cyber-Attack
Europe's Biggest Copper Producer Hit by Cyber-AttackAurubis forced to take IT systems offlineLeer másAurubis forced to take IT systems offline
Most Online Shoppers Would Leave Retailer Following Breach
Most Online Shoppers Would Leave Retailer Following BreachAkamai study finds low levels of trust among consumersLeer másAkamai study finds low levels of trust among consumers
SOC Prime Threat Bounty — September 2022 Results
SOC Prime Threat Bounty — September 2022 Results September ‘22 Publications In September, members of the Threat Bounty Community submitted 441 rules for review by the...
Former British Prime Minister Liz Truss ‘s phone was allegedly hacked by Russian spies
Former British Prime Minister Liz Truss ‘s phone was allegedly hacked by Russian spiesAccording to the Daily Mail, Former British Prime Minister Liz Truss ‘s personal...
CISA, FBI, MS-ISAC Publish Guidelines For Federal Agencies on DDoS Attacks
CISA, FBI, MS-ISAC Publish Guidelines For Federal Agencies on DDoS AttacksThe guidance is for network defenders and leaders to understand and respond to DDoS attacksLeer másThe...
German BKA arrested the alleged operator of Deutschland im Deep Web darknet market
German BKA arrested the alleged operator of Deutschland im Deep Web darknet marketGerman police arrested a student that is suspected of being the administrator of ‘Deutschland...
Data Breach of Missile Maker MBDA May Have Been Real: CloudSEK
Data Breach of Missile Maker MBDA May Have Been Real: CloudSEKThe researchers were able to obtain the ZIP file containing the samples for the data breachLeer...
Malicious dropper apps on Play Store totaled 30.000+ installations
Malicious dropper apps on Play Store totaled 30.000+ installationsThreatFabric researchers discovered five malicious dropper apps on Google Play Store with more than 130,000 downloads. Researchers at...
Interview with Threat Bounty Developer: Wirapong Petshagun
Interview with Threat Bounty Developer: Wirapong Petshagun SOC Prime Threat Bounty Program keeps uniting enthusiastic and keen detection content developers who joined the community to contribute...
GitHub flaw could have allowed attackers to takeover repositories of other users
GitHub flaw could have allowed attackers to takeover repositories of other usersA critical flaw in the cloud-based repository hosting service GitHub could’ve allowed attackers to takeover...
Magniber Ransomware Detection: Threat Actors Spread JavaScript Files Targeting Windows Users
Magniber Ransomware Detection: Threat Actors Spread JavaScript Files Targeting Windows Users Throughout 2021-2022, ransomware continues to be one of the dominant trends in the cyber threat...
Snatch group claims to have hacked military provider HENSOLDT France
Snatch group claims to have hacked military provider HENSOLDT FranceThe Snatch ransomware group claims to have hacked HENSOLDT France, a company specializing in military and defense electronics. The Snatch ransomware...
Detecting Text4Shell (CVE-2022-42889), Critical RCE in Apache Commons Text
Detecting Text4Shell (CVE-2022-42889), Critical RCE in Apache Commons Text Threat actors don’t sleep, and cyber defenders cannot sleep a wink either to keep up with emerging...