Pwn2Own Toronto: 54 hacks, 63 new bugs, $1 million in bountiesThat's a mean average of $15,710 per bug... and 63 fewer bugs out there for crooks...
Month: December 2022
Sourcepass Acquires CCSI, A Leading Enterprise IT Services Provider
Sourcepass Acquires CCSI, A Leading Enterprise IT Services ProviderCCSI motivated by Sourcepass’ innovative service delivery model that leverages advanced AI and RPA workflows Sourcepass announced its...
USENIX Security ’22 – ‘Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data’
USENIX Security ’22 – ‘Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data’Complete Title: USENIX Security '22 - Yongji Wu, Xiaoyu Cao, Jinyuan Jia, Neil...
US HHS warns healthcare orgs of Royal Ransomware attacks
US HHS warns healthcare orgs of Royal Ransomware attacksThe US Department of Health and Human Services (HHS) warns healthcare organizations of Royal ransomware attacks. The human-operated...
Log4Shell Vulnerabilities Still Plague Organizations
Log4Shell Vulnerabilities Still Plague Organizations Almost exactly one year after Log4Shell sent security teams scrambling to patch, more than seven in 10 (72%) of organizations are...
At least 4,460 vulnerable Pulse Connect Secure hosts are exposed to the Internet
At least 4,460 vulnerable Pulse Connect Secure hosts are exposed to the InternetCensys researchers warn of more than 4,000 vulnerable Pulse Connect Secure hosts exposed to...
MuddyWater APT group is back with updated TTPs
MuddyWater APT group is back with updated TTPsThe Iran-linked MuddyWater APT is targeting countries in the Middle East as well as Central and West Asia in a new...
Security Affairs newsletter Round 397
Security Affairs newsletter Round 397A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in...
Pwn2Own Toronto 2022 Day 4: $989K awarded for 63 unique zero-days
Pwn2Own Toronto 2022 Day 4: $989K awarded for 63 unique zero-daysThe Pwn2Own Toronto 2022 is ended, and the participants earned a total of $989,750 for 63...
Government to Fund Security Studies for Hundreds of Students
Government to Fund Security Studies for Hundreds of StudentsLatest move shows urgent need to nurture skills pipelineLeer másLatest move shows urgent need to nurture skills pipeline
Cobalt Mirage Affiliate Uses GitHub to Relay Drokbk Malware Instructions
Cobalt Mirage Affiliate Uses GitHub to Relay Drokbk Malware InstructionsSecureworks said the malicious code is written in .NET and comprises a dropper and a payloadLeer másSecureworks...
Software Supply Chain Attacks Leveraging Open-Sources Repos Growing
Software Supply Chain Attacks Leveraging Open-Sources Repos GrowingReversingLabs found an increasing number of malicious packages in three popular repositoriesLeer másReversingLabs found an increasing number of malicious...
#BHEU: UK Government Calls for Industry Input on its Cybersecurity Strategy
#BHEU: UK Government Calls for Industry Input on its Cybersecurity StrategyA DCMS official sets out the UK government's cybersecurity strategy during Black Hat Europe 2022Leer másA...
Truebot Malware Activity Increases With Possible Evil Corp Connections
Truebot Malware Activity Increases With Possible Evil Corp ConnectionsThe campaigns observed by Cisco Talos have resulted in the creation of two botnetsLeer másThe campaigns observed by...
BEC Attacks Expand Beyond Email and Toward Mobile Devices
BEC Attacks Expand Beyond Email and Toward Mobile DevicesScammers typically obtain mobile numbers from data breaches, social media and data brokersLeer másScammers typically obtain mobile numbers...
TrueBot infections were observed in Clop ransomware attacks
TrueBot infections were observed in Clop ransomware attacksResearchers reported an increase in TrueBot infections, attackers have shifted from using malicious emails as their primary delivery method to other...
North Korean Hackers Impersonate Researchers to Steal Intel
North Korean Hackers Impersonate Researchers to Steal IntelReport associates new intelligence-gathering tactic with Kimsuky groupLeer másReport associates new intelligence-gathering tactic with Kimsuky group
Researchers Find 63 Zero-Day Bugs at Latest Pwn2Own
Researchers Find 63 Zero-Day Bugs at Latest Pwn2OwnCompetition awards winning participants nearly $1mLeer másCompetition awards winning participants nearly $1m
Royal Ransomware Targets US Healthcare
Royal Ransomware Targets US HealthcareRequested ransom payment demands ranged from $250,000 to over $2mLeer másRequested ransom payment demands ranged from $250,000 to over $2m
Evilnum group targets legal entities with a new Janicab variant
Evilnum group targets legal entities with a new Janicab variantA hack-for-hire group dubbed Evilnum is targeting travel and financial entities with the new Janicab malware variant. Kaspersky...
Transitive Dependencies Account for 95% of Bugs
Transitive Dependencies Account for 95% of BugsEndor Labs warns of dangerous complexities in open sourceLeer másEndor Labs warns of dangerous complexities in open source
HSE Cyber-Attack Costs Ireland $83m So Far
HSE Cyber-Attack Costs Ireland $83m So FarA total of roughly 100,000 people had their personal data stolen during the cyber-attackLeer másA total of roughly 100,000 people...
Cryptomining campaign targets Linux systems with Go-based CHAOS Malware
Cryptomining campaign targets Linux systems with Go-based CHAOS MalwareResearchers spotted a cryptocurrency mining campaign targeting Linux users with Go-based CHAOS malware (Trojan.Linux.CHAOSRAT). In November 2022, Trend...
Chaos RAT Used to Enhance Linux Cryptomining Attacks
Chaos RAT Used to Enhance Linux Cryptomining AttacksThe main downloader script and further payloads were hosted in different locationsLeer másThe main downloader script and further payloads...
Diamond Industry Attacked by Iranian Hackers with Data-Wiping Malware
Diamond Industry Attacked by Iranian Hackers with Data-Wiping MalwareA series of data wiper assaults targeting the diamond industry in South Africa, Israel, and Hong Kong have...
Zero Standing Privileges (ZSP) for Organizations: Less Privileges, More Security
Zero Standing Privileges (ZSP) for Organizations: Less Privileges, More SecurityIn complex environments, the need for privilege solutions has grown. Typically, companies with network infrastructure or critical...
Educational Institutions, the Favorite Targets of Vice Society Ransomware in 2022
Educational Institutions, the Favorite Targets of Vice Society Ransomware in 2022Vice Society ransomware seemed to favor educational institutions in their attacks in 2022. The Cybercrime group...
Fortinet urges customers to fix actively exploited FortiOS SSL-VPN bug
Fortinet urges customers to fix actively exploited FortiOS SSL-VPN bugFortinet fixed an actively exploited FortiOS SSL-VPN flaw that could allow a remote, unauthenticated attacker to execute arbitrary code...
What Is DNS Propagation and How to Keep Safe from DNS Attacks
What Is DNS Propagation and How to Keep Safe from DNS AttacksChanging your website’s hosting is the closest you’ll ever get to magic in cybersecurity. It’s...
Security Requirements as an Engineering Challenge
Security Requirements as an Engineering ChallengeBy Milica D. Djekic Independent researcher, Subotica, The Republic of Serbia Abstract Engineering challenges have appeared throughout time […] The post...









