By Byron V. Acohido One of the nascent security disciplines already getting a lot of buzz as RSA Conference 2023 gets ready to open next week...
Day: April 18, 2023
It’s 2023 – You MUST Know The SaaS Applications Your Employees Are Using
Organizations should have free access to their SaaS attack layer By Galit Lubetzky Sharon, Co-Founder & CTO, Wing Security While security budgets were not the first...
How to create Portainer teams for restricted development access
on April 17, 2023, 7:03 PM EDT How to create Portainer teams for restricted development access Jack Wallen shows you how to create a team and...
Credential harvesting malware appears on deep web
Image: Adobe Stock/WunderBild Cloud-focused credential harvester and spam utilities, used to illicitly extract an organization’s database of usernames, passwords and emails, are on the rise. By...
Creative Software Maker Affinity Informs Customers of Forum Breach – Source: www.securityweek.com – Author: Eduard Kovacs –
Source: www.securityweek.com – Author: Eduard Kovacs. Category & Tags: Data Breaches,data breach – Data Breaches,data breach UK-based photo editing, graphic design and publishing software developer Affinity...
The Security and Productivity Implications of Low Code/No Code Development – Source: www.securityweek.com – Author: Kevin Townsend –
Source: www.securityweek.com – Author: Kevin Townsend. Category & Tags: Vulnerabilities,Featured,Software,vulnerability – Vulnerabilities,Featured,Software,vulnerability The low code/no code movement provides simplified app generation – but it needs to...
ZeroFox to Acquire Threat Intelligence Firm LookingGlass for $26 Million – Source: www.securityweek.com – Author: Eduard Kovacs –
Source: www.securityweek.com – Author: Eduard Kovacs. Category & Tags: Funding/M&A,Threat Intelligence,M&A,threat intelligence – Funding/M&A,Threat Intelligence,M&A,threat intelligence ZeroFox (ZFOX), which advertises itself as an external cybersecurity solutions...
Swatting as a Service
Swatting as a Service Motherboard is reporting on AI-generated voices being used for “swatting”: In fact, Motherboard has found, this synthesized call and another against Hempstead...
LockBit Ransomware Group Developing Malware to Encrypt Files on macOS – Source: www.securityweek.com – Author: Eduard Kovacs –
Source: www.securityweek.com – Author: Eduard Kovacs. Category & Tags: Ransomware,ransomware – Ransomware,ransomware The notorious LockBit ransomware group is apparently developing a piece of malware that can...
FIN7, Former Conti Gang Members Collaborate on ‘Domino’ Malware
Former members of the Conti ransomware group are compromising systems for follow-up exploits using malware that the financially motivated FIN7 group developed; FIN7 has used the “Domino” tool in...
lockr Raises $2.5M
NEW YORK, April 17, 2023 /PRNewswire/ — lockr, the first consumer-focused platform for digital identity, consent and data, has raised $2.5M in pre-seed funding. Mozilla Ventures, Junction Venture Partners, and...
Google Issues Emergency Chrome Update for Zero-Day Bug
A Google Chrome zero-day vulnerability is under active exploit in the wild, and while details are scarce, users are urged to update their Windows, Mac, and...
NSA’s National Centers for Academic Excellent (NCAE) Cyber Games to Hold National Finals on April 22
Cyber Florida at the University of South Florida – Tampa will host the national championship round of the NCAE Cyber Games on April 22 on the...
Pen Testers Need to Hack AI, but Also Question Its Existence
Samsung has banned some uses of ChatGPT, Ford Motor and Volkswagen shuttered their self-driving car firm, and a letter calling for a pause in training more...
How CISOs Can Craft Better Narratives for the Board
For at least a decade now, career-minded security leaders have well understood the importance of effective communication with the board and CEO. CISOs know they must...
Aloha PoS Restaurant Software Downed by Ransomware Attack
After days of outages, NCR Corp. has confirmed that its Aloha point-of-sale (PoS) software platform, used by thousands of restaurants across the US, was taken down...
Ex-Conti members and FIN7 devs team up to push new Domino malware
Ex-Conti ransomware members have teamed up with the FIN7 threat actors to distribute a new malware family named ‘Domino’ in attacks on corporate networks. Domino is...
Hackers abuse Google Command and Control red team tool in attacks
The Chinese state-sponsored hacking group APT41 was found abusing the GC2 (Google Command and Control) red teaming tool in data theft attacks against a Taiwanese media...
New QBot email attacks use PDF and WSF combo to install malware
QBot malware is now distributed in phishing campaigns utilizing PDFs and Windows Script Files (WSF) to infect Windows devices. Qbot (aka QakBot) is a former banking...
New Chameleon Android malware mimics bank, govt, and crypto apps
A new Android trojan called ‘Chameleon’ has been targeting users in Australia and Poland since the start of the year, mimicking the CoinSpot cryptocurrency exchange, an...