In a confusing mess, a recent Microsoft Defender update rolled out a new security feature called ‘Kernel-mode Hardware-enforced Stack Protection,’ while removing the LSA protection feature....
Day: April 20, 2023
Microsoft SQL servers hacked to deploy Trigona ransomware
Attackers are hacking into poorly secured and Interned-exposed Microsoft SQL (MS-SQL) servers to deploy Trigona ransomware payloads and encrypt all files. The MS-SQL servers are being...
Fortra shares findings on GoAnywhere MFT zero-day attacks
Fortra has completed its investigation into the exploitation of CVE-2023-0669, a zero-day flaw in the GoAnywhere MFT solution that the Clop ransomware gang exploited to steal...
Ransomware gangs abuse Process Explorer driver to kill security software
Threat actors use a new hacking tool dubbed AuKill to disable Endpoint Detection & Response (EDR) Software on targets’ systems before deploying backdoors and ransomware in...
UK cyber-argency warns of a new ‘class’ of Russian hackers
The United Kingdom’s NCSC (National Cyber Security Centre) is warning of a heightened risk from attacks by state-aligned Russian hacktivists, urging all organizations in the country...
Incident Response Cheatsheet Windows & Linux by Hackingarticles.in – Ignite Technologies
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Ransomware attacks increased 91% in March, as threat actors find new vulnerabilities
on April 19, 2023, 6:31 PM EDT Ransomware attacks increased 91% in March, as threat actors find new vulnerabilities Ransomware attacks skyrocketed last month according to...
Investors Bet Big on Safe Security for Cyber Risk Management – Source: www.securityweek.com – Author: Ryan Naraine –
Source: www.securityweek.com – Author: Ryan Naraine. Category & Tags: Funding/M&A – Funding/M&A Safe Security, a startup building AI-based technology to help organizations manage cyber risk, has...
Russian Man Who Laundered Money for Ryuk Ransomware Gang Sentenced – Source: www.securityweek.com – Author: Eduard Kovacs –
Source: www.securityweek.com – Author: Eduard Kovacs. Category & Tags: Cybercrime,Ransomware,sentenced – Cybercrime,Ransomware,sentenced Denis Mihaqlovic Dubnikov, the Russian national who recently pleaded guilty to charges related to...
Dasera Scores $12M Funding for Cloud Data Security – Source: www.securityweek.com – Author: Ryan Naraine –
Source: www.securityweek.com – Author: Ryan Naraine. Category & Tags: Cloud Security,Funding/M&A – Cloud Security,Funding/M&A Silicon Valley early-stage startup Dasera has banked $12 million in venture capital...
Enterprises Exposed to Hacker Attacks Due to Failure to Wipe Discarded Routers – Source: www.securityweek.com – Author: Eduard Kovacs –
Source: www.securityweek.com – Author: Eduard Kovacs. Category & Tags: Network Security,router – Network Security,router Discarded enterprise routers are often not wiped properly and store secrets that...
Google Patches Second Chrome Zero-Day Vulnerability of 2023 – Source: www.securityweek.com – Author: Ionut Arghire –
Source: www.securityweek.com – Author: Ionut Arghire. Category & Tags: Vulnerabilities,Chrome,Featured,Zero-Day – Vulnerabilities,Chrome,Featured,Zero-Day Google on Tuesday announced patches for another zero-day vulnerability found in the Chrome browser....
Oracle Releases 433 New Security Patches With April 2023 CPU – Source: www.securityweek.com – Author: Ionut Arghire –
Source: www.securityweek.com – Author: Ionut Arghire. Category & Tags: Vulnerabilities,Oracle,vulnerability – Vulnerabilities,Oracle,vulnerability Oracle on Tuesday announced the release of 433 new patches as part of its...
Coro Raises $75 Million for Mid-Market Cybersecurity Platform – Source: www.securityweek.com – Author: Ionut Arghire –
Source: www.securityweek.com – Author: Ionut Arghire. Category & Tags: Cybersecurity Funding,Funding/M&A,funding – Cybersecurity Funding,Funding/M&A,funding Coro, a cybersecurity firm focused on mid-market organizations, today announced that it...
Microsoft: Iranian Hackers Moved From Recon to Targeting US Critical Infrastructure – Source: www.securityweek.com – Author: Ionut Arghire –
Source: www.securityweek.com – Author: Ionut Arghire. Category & Tags: Cyberwarfare,Iran – Cyberwarfare,Iran A subgroup of Iran-linked advanced persistent threat (APT) actor Mint Sandstorm has started to...
US, UK: Russia Exploiting Old Vulnerability to Hack Cisco Routers – Source: www.securityweek.com – Author: Eduard Kovacs –
Source: www.securityweek.com – Author: Eduard Kovacs. Category & Tags: Malware & Threats,Vulnerabilities,Cisco,Featured – Malware & Threats,Vulnerabilities,Cisco,Featured Government agencies in the United States and United Kingdom have...
Killnet Boss Exposes Rival Leader in Kremlin Hacktivist Beef
There’s drama brewing between various Kremlin-backed hacktivist groups, which percolated into public view this week with the move by Killnet group leader “Killmilk” to expose the identity...
Russian Fancy Bear APT Exploited Unpatched Cisco Routers to Hack US, EU Gov’t Agencies
As recently as 2021, the notorious Russian APT28 was exploiting network routers running outdated versions of Cisco’s IOS and IOS XE operating system software, using them...
7 Sizzling Sessions to Check Out at RSA Conference 2023
Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe Views:...
Coro Raises an Additional $75M Bringing the Total Raised to $155M in 12 Months
NEW YORK–(BUSINESS WIRE) — Coro, the modern cybersecurity platform for mid-market organizations, today announced a $75M funding round, bringing the total funding raised in the last...
Gary Bowser, Former Nintendo Hacker, Released From Prison
Gary Bowser, who was indicted in 2020 and sentenced in 2021 to 40 months in prison for being a part of a hacking ring known as Team...
Popular Fitness Apps Leak Location Data Even When Users Set Privacy Zones
Fitness apps such as Strava leak sensitive location information of users, even when they’ve used in-app features to specifically set up privacy zones to hide their...
3 Flaws, 1 War Dominated Cyber-Threat Landscape in 2022
Popular attacks for a trio of critical vulnerabilities kept exploitation at the top of the list of initial-access methods in 2022, while the war between Russia...
OT Zero Trust
The Last Frontier to Protect OT Environments By Terence Liu, CEO, TXOne Networks OT Zero Trust – a Device-Centric Methodology In the IT world, the heart...
Akamai Technologies to Acquire API Security Company Neosec
CAMBRIDGE, Mass., April 19, 2023 /PRNewswire/ — Akamai Technologies, Inc. (NASDAQ: AKAM), the cloud company that powers and protects life online, today announces that it has entered into a...
How to Prevent 2 Common Attacks on MFA
It’s a well-known and statistically proven fact that password-only credentials pose the highest cyber-risk to people and organizations. Passwords are easily compromised through a wide variety...
Smashing Security podcast #318: Tesla workers spy on drivers, and Operation Fox Hunt scams
Graham wonders what would happen if his bouncing buttocks were captured on camera by a Tesla employee, and we take a look at canny scams connected...