'Team Mysterious Bangladesh' Hackers Target Indian Education EntityThe hackers allegedly stole PII, including names, Aadhar numbers and IFSC codesLeer másThe hackers allegedly stole PII, including names,...
Month: December 2022
Rackspace Restores Systems After Security Incident
Rackspace Restores Systems After Security IncidentThe known impact was isolated to a portion of the firm's Hosted Exchange platformLeer másThe known impact was isolated to a...
Data Breaches in Australia Will Now Result in Fines of Up to AU$50 Million
Data Breaches in Australia Will Now Result in Fines of Up to AU$50 MillionThe Australian Parliament approved Government’s privacy penalty bill: the maximum fine for companies...
A new Linux flaw can be chained with other two bugs to gain full root privileges
A new Linux flaw can be chained with other two bugs to gain full root privilegesQualys researchers demonstrated how to chain a new Linux flaw with...
Malicious Apps with Over 2 Million Installs Found on Google Play
Malicious Apps with Over 2 Million Installs Found on Google PlayMultiple apps pretending to be useful utilities and system optimizers, but hiding malware have been identified...
Google fixed the ninth actively exploited Chrome zeroday this year
Google fixed the ninth actively exploited Chrome zeroday this yearGoogle released security updates to address a new Chrome zero-day flaw, tracked as CVE-2022-4262, actively exploited in...
Lazarus Hacking Group Uses New Fake Crypto App to Spread Malware
Lazarus Hacking Group Uses New Fake Crypto App to Spread MalwareLazarus hacking group spreads malware using a fake cryptocurrency app called BloxHolder. This made-up brand pretends...
Security Affairs newsletter Round 396
Security Affairs newsletter Round 396A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in...
Critical Ping bug potentially allows remote hack of FreeBSD systems
Critical Ping bug potentially allows remote hack of FreeBSD systemsA critical stack-based buffer overflow bug, tracked as CVE-2022-23093, in the ping service can allow to take over FreeBSD...
Lazarus APT uses fake cryptocurrency apps to spread AppleJeus Malware
Lazarus APT uses fake cryptocurrency apps to spread AppleJeus MalwareThe North Korea-linked Lazarus APT spreads fake cryptocurrency apps under the fake brand BloxHolder to install the...
Law enforcement agencies can extract data from thousands of cars’ infotainment systems
Law enforcement agencies can extract data from thousands of cars’ infotainment systemsLaw enforcement agencies can extract data from the infotainment systems of thousands of different car...
US DHS Cyber Safety Board will review Lapsus$ gang’s operations
US DHS Cyber Safety Board will review Lapsus$ gang’s operationsUS DHS Cyber Safety Review Board will review attacks linked to the Lapsus$ extortion gang that hit...
New CryWiper wiper targets Russian entities masquerading as a ransomware
New CryWiper wiper targets Russian entities masquerading as a ransomwareExperts spotted a new data wiper, dubbed CryWiper, that was employed in destructive attacks against Russian mayor’s offices...
Phishing Attack Strikes Apple Users During Black Friday Sales
Phishing Attack Strikes Apple Users During Black Friday SalesApple users were the target of a phishing attack that used social engineering last month, during Black Friday,...
French hospital cancels operations after a ransomware attack
French hospital cancels operations after a ransomware attackA French hospital near Paris canceled operations and transfer some patients due to a cyber attack suffered over the...
Exclusive: The largest mobile malware marketplace identified by Resecurity in the Dark Web
Exclusive: The largest mobile malware marketplace identified by Resecurity in the Dark WebResecurity has identified a new underground marketplace in the Dark Web oriented towards mobile malware developers...
Weekly Update 324
Weekly Update 324We're in Copenhagen! Scott and family joined us in Oslo for round 2 of wedding celebrations this week before jumping on the ferry to...
Separation of Privilege (SoP) 101: Definition and Best Practices
Separation of Privilege (SoP) 101: Definition and Best PracticesA system’s security should be effective enough to protect against potential attacks. If the software is partitioned into...
Russia Hacked: ‘Wiper’ Attacks Spread Across Country as New Ransomware
Russia Hacked: ‘Wiper’ Attacks Spread Across Country as New RansomwareCybersecurity researchers warns that a new data-wiping trojan has hijacked judicial courts and mayoral offices in Russia....
A New Malware Exploits A Critical Vulnerability on Redis Servers
A New Malware Exploits A Critical Vulnerability on Redis ServersTo gain control of infected systems and, likely, to construct a botnet network, a new Go-based malware...
Introduction to Remote Spectrum Monitoring
Introduction to Remote Spectrum MonitoringSpectrum Monitoring for Critical Infrastructure By Brandon Malatest, Per Vices Corporation As wireless communications break its expansion banks, […] The post Introduction...
New SiriusXM Vulnerability Allows Hackers to Unlock and Start Connected Cars Remotely
New SiriusXM Vulnerability Allows Hackers to Unlock and Start Connected Cars RemotelyResearchers have recently discovered a security vulnerability that allows threat actors to remotely attack vehicles...
In Government, Secure Data Drives the Greater Good
In Government, Secure Data Drives the Greater GoodBy Carolyn Duby, Field CTO and Cybersecurity Lead, Cloudera Government Solutions As a key component of President Biden’s […]...
Is AI At the Edge Right for Your Business And Three Tips To Consider
Is AI At the Edge Right for Your Business And Three Tips To ConsiderBy Camille Morhardt, Dir Security Initiatives & Rita Wouhaybi, Senior Principal AI Engineer,...
The Role of Endpoint Security and Management In Threat Detection
The Role of Endpoint Security and Management In Threat DetectionBy Ashley Leonard, CEO & Founder, Syxsense According to a recent Verizon DBIR, 70% of security breaches...
Is Your Passwordless Solution Really Passwordless?
Is Your Passwordless Solution Really Passwordless?By Tim Callan, Chief Compliance Officer, Sectigo The term “passwordless” is a trendy marketing buzzword with no shortage […] The post...
Penetration Scanning Must Be Key Part of The Modern Business Arsenal
Penetration Scanning Must Be Key Part of The Modern Business ArsenalBy Patti Key, Chief Revenue Officer (CRO), TPx Security remains among companies’ top challenges, permeating nearly...
Minimizing the Military Attack Surface with Peer-to-Peer Communications and Zero Trust
Minimizing the Military Attack Surface with Peer-to-Peer Communications and Zero TrustBy Adam Fish, CEO, Ditto Perhaps there’s no scenario where cybersecurity is more critical than on...
CVE-2022-41974, CVE-2022-41973, CVE-2022-3328 Exploit Detection: Three Linux Vulnerabilities Chained to Gain Full Root Privileges
CVE-2022-41974, CVE-2022-41973, CVE-2022-3328 Exploit Detection: Three Linux Vulnerabilities Chained to Gain Full Root Privileges Security experts from Qualys’ Threat Research Unit warn of a novel vulnerability ...
Whoops! Researchers accidentally crash botnet used to launch DDoS and cryptomining campaigns
Whoops! Researchers accidentally crash botnet used to launch DDoS and cryptomining campaignsResearchers investigating a newly-discovered botnet have admitted that they "accidentally" broke Read more in my...
