CISA Warns Against Royal Ransomware in New AdvisoryMalicious activity using a particular malware variant has been spotted since September 2022Read MoreMalicious activity using a particular malware...
Month: March 2023
New Backdoor MQsTTang Attributed to Mustang Panda Group
New Backdoor MQsTTang Attributed to Mustang Panda GroupUnlike the group’s usual tactics, MQsTTang only has a single stage and does not use obfuscationRead MoreUnlike the group’s...
Retailer WH Smith discloses data breach after a cyberattack
Retailer WH Smith discloses data breach after a cyberattackRetailer WH Smith disclosed a data breach following a cyber attack, threat actors had access to access company...
The U.S. CISA and FBI warn of Royal ransomware operation
The U.S. CISA and FBI warn of Royal ransomware operationThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of the capabilities of the recently emerged...
Trusted Platform Module (TPM) 2.0 flaws could impact billions of devices
Trusted Platform Module (TPM) 2.0 flaws could impact billions of devicesTwo vulnerabilities affecting the Trusted Platform Module (TPM) 2.0 library could potentially lead to information disclosure...
MQsTTang, a new backdoor used by Mustang Panda APT against European entities
MQsTTang, a new backdoor used by Mustang Panda APT against European entitiesChina-Linked Mustang Panda APT employed MQsTTang backdoor as part of an ongoing campaign targeting European entities....
Weekly Update 337
Weekly Update 337Guns! You know, the things you kinda want to keep pretty well protected and out of the hands of nefarious parties, like the kinds...
Cyberattack on British Retailer WH Smith Exposes Employees` Data
Cyberattack on British Retailer WH Smith Exposes Employees` DataThreat actors breached WH Smith, the 1,700 locations UK retailer, and exposed data belonging to current and former...
Chinese Hackers Are Using a New Backdoor to Deploy Malware
Chinese Hackers Are Using a New Backdoor to Deploy MalwareThis year, the Chinese cyberespionage group Mustang Panda began deploying a new custom backdoor named ‘MQsTTang’ in...
How Royal Ransomware Could Wreak Havoc on the U.S. Digital Economy
How Royal Ransomware Could Wreak Havoc on the U.S. Digital EconomyEarlier this year, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released an advisory regarding the...
Scanning Attack: What It Is and How to Protect Your Organization Against It?
Scanning Attack: What It Is and How to Protect Your Organization Against It?A scanning attack is a method used by threat actors to identify vulnerabilities in...
Nick Weaver on Regulating Cryptocurrency
Nick Weaver on Regulating CryptocurrencyNicholas Weaver wrote an excellent paper on the problems of cryptocurrencies and the need to regulate the space—with all existing regulations. His...
Play ransomware claims disruptive attack on City of Oakland
Play ransomware claims disruptive attack on City of OaklandThe Play ransomware gang has taken responsibility for a cyberattack on the City of Oakland that has disrupted...
FBI and CISA warn of increasing Royal ransomware attack risks
FBI and CISA warn of increasing Royal ransomware attack risksCISA and the FBI have issued a joint advisory highlighting the increasing threat behind ongoing Royal ransomware...
Brave Search launches AI-powered summarizer in search results
Brave Search launches AI-powered summarizer in search resultsBrave Search has incorporated a new AI-powered tool named Summarizer, which gives a summarized answer to an inputted question...
White House cyber security strategy shifts burden to providers
White House cyber security strategy shifts burden to providersEXECUTIVE SUMMARY: On Thursday, the White House released an ambitious and wide-ranging cyber security plan that calls for...
LIVE Webinar | Stop, Drop (a Table) & Roll: An SQL Highlight Discussion
LIVE Webinar | Stop, Drop (a Table) & Roll: An SQL Highlight DiscussionPost ContentRead MoreDataBreachToday.com RSS Syndication
US EPA Regulates Public Drinking Water for Cybersecurity
US EPA Regulates Public Drinking Water for CybersecurityBiden Administration Says Ransomware and Other Incidents Demand Regulatory ResponseCybersecurity will take its place alongside chemical contaminant removal as...
Zscaler Lays Off 3% of Staff Amid Delays Closing Large Deals
Zscaler Lays Off 3% of Staff Amid Delays Closing Large DealsNearly 180 Workers Exit After Vetting Around Large Deals Takes Bite Out of BillingsZscaler has axed...
US Cybersecurity Strategy Doubles Down on Hitting Ransomware
US Cybersecurity Strategy Doubles Down on Hitting RansomwarePolicy Shift Unlocks Resources to Battle Ransomware as National Security ThreatThe Biden administration, in its new national cybersecurity strategy,...
Experts Sound Alarm Over Growing Attacks Exploiting Zoho ManageEngine Products
Experts Sound Alarm Over Growing Attacks Exploiting Zoho ManageEngine ProductsMultiple threat actors have been observed opportunistically weaponizing a now-patched critical security vulnerability impacting several Zoho ManageEngine...
Hackers Using Trojanized macOS Apps to Deploy Evasive Cryptocurrency Mining Malware
Hackers Using Trojanized macOS Apps to Deploy Evasive Cryptocurrency Mining MalwareTrojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on macOS...
Even Top-Ranked Android Apps in Google Play Store Provide Misleading Data Safety Labels
Even Top-Ranked Android Apps in Google Play Store Provide Misleading Data Safety LabelsAn investigation into data safety labels for Android apps available on the Google Play...
Supply Chain Security: What You Need to Know – Part 3: Integrity from Core to Cloud
Supply Chain Security: What You Need to Know – Part 3: Integrity from Core to CloudIn this series, we have been taking a long look at...
Acunetix releases a security check for Fortinet RCE flaw
Acunetix releases a security check for Fortinet RCE flawThis Acunetix release introduces a new security check for the Fortinet RCE flaw (CVE-2022-39952). The FortiNAC, a network...
USENIX Security ’22 – Umar Iqbal, Charlie Wolfe, Charles Nguyen, Steven Englehardt, Zubair Shafiq – ‘Khaleesi: Breaker Of Advertising And Tracking Request Chains’
USENIX Security ’22 – Umar Iqbal, Charlie Wolfe, Charles Nguyen, Steven Englehardt, Zubair Shafiq – ‘Khaleesi: Breaker Of Advertising And Tracking Request Chains’Our thanks to USENIX...
Attackers Don’t Hack, They Log In.
Attackers Don’t Hack, They Log In.Reading Time: 5 minutes Lessons from the LastPass Breach Below we’ll detail the latest LastPass incident, discuss the implications of this...
CISA Warns of Active Exploitation of ZK Java Framework Vulnerability
CISA Warns of Active Exploitation of ZK Java Framework VulnerabilityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2022-36537, a high-severity flaw impacting the ZK...
Ranking Cyber Risks to Healthcare Companies with Risk Quantification
Ranking Cyber Risks to Healthcare Companies with Risk Quantification It’s high stakes in the cyber risk landscape for healthcare providers, payers, medical device makers, third-party vendors,...
UnFAIR: The Limitations of FAIR’s Risk Model
UnFAIR: The Limitations of FAIR’s Risk ModelThis is blog 2 of 3 in our FAIR model series. The limitations of FAIR’s data collection process are discussed...
