Procurement Guide Offers Best Practices for Moving to CloudThe Center for Digital Government just released a new guide to help governments in their cloud journeys. Here’s...
Day: March 12, 2023
USENIX Security ’22 – Xiaochen Zou, Guoren Li, Weiteng Chen, Hang Zhang, Zhiyun Qian – ‘SyzScope: Revealing High-Risk Security Impacts Of Fuzzer-Exposed Bugs In Linux Kernel’
USENIX Security ’22 – Xiaochen Zou, Guoren Li, Weiteng Chen, Hang Zhang, Zhiyun Qian – ‘SyzScope: Revealing High-Risk Security Impacts Of Fuzzer-Exposed Bugs In Linux Kernel’Our...
Cisco fixed CVE-2023-20049 DoS flaw affecting enterprise routers
Cisco fixed CVE-2023-20049 DoS flaw affecting enterprise routersCisco fixed a high-severity DoS vulnerability (CVE-2023-20049) in IOS XR software that impacts several enterprise routers. Cisco has released...
Acronis states that only one customer’s account has been compromised. Much ado about nothing
Acronis states that only one customer’s account has been compromised. Much ado about nothingAcronis downplays the severity of the recent security breach explaining that only a...
CASPER attack steals data using air-gapped computer’s internal speaker
CASPER attack steals data using air-gapped computer's internal speakerResearchers at the School of Cyber Security at Korea University, Seoul, have presented a new covert channel attack...
Medusa ransomware gang picks up steam as it targets companies worldwide
Medusa ransomware gang picks up steam as it targets companies worldwideA ransomware operation known as Medusa has begun to pick up steam in 2023, targeting corporate...
Microsoft finally fixes Windows 11 slow file copy issues over SMB
Microsoft finally fixes Windows 11 slow file copy issues over SMBMicrosoft has finally addressed a known issue causing significant performance hits when copying large files over...
Staples-owned Essendant facing multi-day “outage,” orders frozen
Staples-owned Essendant facing multi-day "outage," orders frozenStaples-owned Essendant, a wholesale distributor of stationary and office supplies, is experiencing a multi-day systems "outage" preventing customers and suppliers...
New ScrubCrypt Crypter Used in Cryptojacking Attacks Targeting Oracle WebLogic
New ScrubCrypt Crypter Used in Cryptojacking Attacks Targeting Oracle WebLogicThe infamous cryptocurrency miner group called 8220 Gang has been observed using a new crypter called ScrubCrypt...
Iranian Hackers Target Women Involved in Human Rights and Middle East Politics
Iranian Hackers Target Women Involved in Human Rights and Middle East PoliticsIranian state-sponsored actors are continuing to engage in social engineering campaigns targeting researchers by impersonating...
Does Your Help Desk Know Who’s Calling?
Does Your Help Desk Know Who's Calling?Phishing, the theft of users' credentials or sensitive data using social engineering, has been a significant threat since the early...
IceFire Ransomware Exploits IBM Aspera Faspex to Attack Linux-Powered Enterprise Networks
IceFire Ransomware Exploits IBM Aspera Faspex to Attack Linux-Powered Enterprise NetworksA previously known Windows-based ransomware strain known as IceFire has expanded its focus to target Linux...
Hackers Exploiting Remote Desktop Software Flaws to Deploy PlugX Malware
Hackers Exploiting Remote Desktop Software Flaws to Deploy PlugX MalwareSecurity vulnerabilities in remote desktop programs such as Sunlogin and AweSun are being exploited by threat actors...
North Korean UNC2970 Hackers Expands Operations with New Malware Families
North Korean UNC2970 Hackers Expands Operations with New Malware FamiliesA North Korean espionage group tracked as UNC2970 has been observed employing previously undocumented malware families as part of...
Xenomorph Android Banking Trojan Returns with a New and More Powerful Variant
Xenomorph Android Banking Trojan Returns with a New and More Powerful VariantA new variant of the Android banking trojan named Xenomorph has surfaced in the wild,...
When Partial Protection is Zero Protection: The MFA Blind Spots No One Talks About
When Partial Protection is Zero Protection: The MFA Blind Spots No One Talks AboutMulti-factor Authentication (MFA) has long ago become a standard security practice. With a...
International Law Enforcement Takes Down Infamous NetWire Cross-Platform RAT
International Law Enforcement Takes Down Infamous NetWire Cross-Platform RATA coordinated international law enforcement exercise has taken down the online infrastructure associated with a cross-platform remote access...
China-linked Hackers Targeting Unpatched SonicWall SMA Devices with Malware
China-linked Hackers Targeting Unpatched SonicWall SMA Devices with MalwareA suspecting China-linked hacking campaign has been observed targeting unpatched SonicWall Secure Mobile Access (SMA) 100 appliances to drop malware...
New Version of Prometei Botnet Infects Over 10,000 Systems Worldwide
New Version of Prometei Botnet Infects Over 10,000 Systems WorldwideAn updated version of a botnet malware called Prometei has infected more than 10,000 systems worldwide since November 2022....
Hunting Emotet: How Behavioural Hunting Trumps IOC Detection Every Time
Hunting Emotet: How Behavioural Hunting Trumps IOC Detection Every TimeAs a threat hunter, I have seen the evolution of cyber threats firsthand and the challenges that...
USENIX Security ’22 – Shujiang Wu, Jianjia Yu, Min Yang, Yinzhi Cao – ‘Rendering Contention Channel Made Practical In Web Browsers’
USENIX Security ’22 – Shujiang Wu, Jianjia Yu, Min Yang, Yinzhi Cao – ‘Rendering Contention Channel Made Practical In Web Browsers’Our thanks to USENIX for publishing...
A security use case for ChatGPT: Email Scam Robo Judge
A security use case for ChatGPT: Email Scam Robo JudgeI have been noodling around with ChatGPT recently and have found a nice little use case that...
PlugX malware delivered by exploiting flaws in Chinese programs
PlugX malware delivered by exploiting flaws in Chinese programsResearchers observed threat actors deploying PlugX malware by exploiting flaws in Chinese remote control programs Sunlogin and Awesun....
Clop ransomware gang begins extorting GoAnywhere zero-day victims
Clop ransomware gang begins extorting GoAnywhere zero-day victimsThe Clop ransomware gang has begun extorting companies whose data was stolen using a zero-day vulnerability in the Fortra...
US Bracing for Bolder, More Brazen Russian Cyberattacks
US Bracing for Bolder, More Brazen Russian CyberattacksPost ContentRead MoreProofpoint News Feed
Access management must get stronger in a zero-trust world
Access management must get stronger in a zero-trust worldPost ContentRead MoreProofpoint News Feed
Scammers Impersonate Barclays, Shell As Investment Fraud Soars
Scammers Impersonate Barclays, Shell As Investment Fraud SoarsPost ContentRead MoreProofpoint News Feed
Russian Influence Duo Targets Politicians, CEOs for Embarrassing Video Calls
Russian Influence Duo Targets Politicians, CEOs for Embarrassing Video CallsPost ContentRead MoreProofpoint News Feed
The Anti-Fragile CISO
The Anti-Fragile CISOPost ContentRead MoreProofpoint News Feed