Lazarus Hacking Group Uses New Fake Crypto App to Spread MalwareLazarus hacking group spreads malware using a fake cryptocurrency app called BloxHolder. This made-up brand pretends...
Day: December 5, 2022
Security Affairs newsletter Round 396
Security Affairs newsletter Round 396A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in...
Critical Ping bug potentially allows remote hack of FreeBSD systems
Critical Ping bug potentially allows remote hack of FreeBSD systemsA critical stack-based buffer overflow bug, tracked as CVE-2022-23093, in the ping service can allow to take over FreeBSD...
Lazarus APT uses fake cryptocurrency apps to spread AppleJeus Malware
Lazarus APT uses fake cryptocurrency apps to spread AppleJeus MalwareThe North Korea-linked Lazarus APT spreads fake cryptocurrency apps under the fake brand BloxHolder to install the...
Law enforcement agencies can extract data from thousands of cars’ infotainment systems
Law enforcement agencies can extract data from thousands of cars’ infotainment systemsLaw enforcement agencies can extract data from the infotainment systems of thousands of different car...
US DHS Cyber Safety Board will review Lapsus$ gang’s operations
US DHS Cyber Safety Board will review Lapsus$ gang’s operationsUS DHS Cyber Safety Review Board will review attacks linked to the Lapsus$ extortion gang that hit...
New CryWiper wiper targets Russian entities masquerading as a ransomware
New CryWiper wiper targets Russian entities masquerading as a ransomwareExperts spotted a new data wiper, dubbed CryWiper, that was employed in destructive attacks against Russian mayor’s offices...
Phishing Attack Strikes Apple Users During Black Friday Sales
Phishing Attack Strikes Apple Users During Black Friday SalesApple users were the target of a phishing attack that used social engineering last month, during Black Friday,...
French hospital cancels operations after a ransomware attack
French hospital cancels operations after a ransomware attackA French hospital near Paris canceled operations and transfer some patients due to a cyber attack suffered over the...
Exclusive: The largest mobile malware marketplace identified by Resecurity in the Dark Web
Exclusive: The largest mobile malware marketplace identified by Resecurity in the Dark WebResecurity has identified a new underground marketplace in the Dark Web oriented towards mobile malware developers...
Weekly Update 324
Weekly Update 324We're in Copenhagen! Scott and family joined us in Oslo for round 2 of wedding celebrations this week before jumping on the ferry to...
Separation of Privilege (SoP) 101: Definition and Best Practices
Separation of Privilege (SoP) 101: Definition and Best PracticesA system’s security should be effective enough to protect against potential attacks. If the software is partitioned into...
Russia Hacked: ‘Wiper’ Attacks Spread Across Country as New Ransomware
Russia Hacked: ‘Wiper’ Attacks Spread Across Country as New RansomwareCybersecurity researchers warns that a new data-wiping trojan has hijacked judicial courts and mayoral offices in Russia....
A New Malware Exploits A Critical Vulnerability on Redis Servers
A New Malware Exploits A Critical Vulnerability on Redis ServersTo gain control of infected systems and, likely, to construct a botnet network, a new Go-based malware...
Introduction to Remote Spectrum Monitoring
Introduction to Remote Spectrum MonitoringSpectrum Monitoring for Critical Infrastructure By Brandon Malatest, Per Vices Corporation As wireless communications break its expansion banks, […] The post Introduction...
New SiriusXM Vulnerability Allows Hackers to Unlock and Start Connected Cars Remotely
New SiriusXM Vulnerability Allows Hackers to Unlock and Start Connected Cars RemotelyResearchers have recently discovered a security vulnerability that allows threat actors to remotely attack vehicles...
In Government, Secure Data Drives the Greater Good
In Government, Secure Data Drives the Greater GoodBy Carolyn Duby, Field CTO and Cybersecurity Lead, Cloudera Government Solutions As a key component of President Biden’s […]...
Is AI At the Edge Right for Your Business And Three Tips To Consider
Is AI At the Edge Right for Your Business And Three Tips To ConsiderBy Camille Morhardt, Dir Security Initiatives & Rita Wouhaybi, Senior Principal AI Engineer,...
The Role of Endpoint Security and Management In Threat Detection
The Role of Endpoint Security and Management In Threat DetectionBy Ashley Leonard, CEO & Founder, Syxsense According to a recent Verizon DBIR, 70% of security breaches...
Is Your Passwordless Solution Really Passwordless?
Is Your Passwordless Solution Really Passwordless?By Tim Callan, Chief Compliance Officer, Sectigo The term “passwordless” is a trendy marketing buzzword with no shortage […] The post...
Penetration Scanning Must Be Key Part of The Modern Business Arsenal
Penetration Scanning Must Be Key Part of The Modern Business ArsenalBy Patti Key, Chief Revenue Officer (CRO), TPx Security remains among companies’ top challenges, permeating nearly...
Minimizing the Military Attack Surface with Peer-to-Peer Communications and Zero Trust
Minimizing the Military Attack Surface with Peer-to-Peer Communications and Zero TrustBy Adam Fish, CEO, Ditto Perhaps there’s no scenario where cybersecurity is more critical than on...
CVE-2022-41974, CVE-2022-41973, CVE-2022-3328 Exploit Detection: Three Linux Vulnerabilities Chained to Gain Full Root Privileges
CVE-2022-41974, CVE-2022-41973, CVE-2022-3328 Exploit Detection: Three Linux Vulnerabilities Chained to Gain Full Root Privileges Security experts from Qualys’ Threat Research Unit warn of a novel vulnerability ...
Whoops! Researchers accidentally crash botnet used to launch DDoS and cryptomining campaigns
Whoops! Researchers accidentally crash botnet used to launch DDoS and cryptomining campaignsResearchers investigating a newly-discovered botnet have admitted that they "accidentally" broke Read more in my...
LastPass Security Breach
LastPass Security BreachThe company was hacked, and customer information accessed. No passwords were compromised. Leer másSchneier on SecurityThe company was hacked, and customer information accessed. No...
Existential Risk and the Fermi Paradox
Existential Risk and the Fermi ParadoxWe know that complexity is the worst enemy of security, because it makes attack easier and defense harder. This becomes catastrophic...
ConnectWise Quietly Patches Flaw That Helps Phishers
ConnectWise Quietly Patches Flaw That Helps PhishersConnectWise, which offers a self-hosted, remote desktop software application that is widely used by Managed Service Providers (MSPs), is warning...
CAPTCHA
CAPTCHAThis is an actual CAPTCHA I was shown when trying to log into PayPal. As an actual human and not a bot, I had no idea...
Friday Squid Blogging: Legend of the Indiana Oil-Pit Squid
Friday Squid Blogging: Legend of the Indiana Oil-Pit SquidAt a GMC plant. As usual, you can also use this squid post to talk about the security...
Judge Orders U.S. Lawyer in Russian Botnet Case to Pay Google
Judge Orders U.S. Lawyer in Russian Botnet Case to Pay GoogleIn December 2021, Google filed a civil lawsuit against two Russian men thought to be responsible...