Source: securityboulevard.com – Author: Richi Jennings Starting with ancient, vulnerable legacy code, Redmond team rewrites chunks in trendy secure language. It’s an open secret that Microsoft...
Day: April 28, 2023
USENIX Enigma 2023 – Sarah Aoun – ‘Working On The Frontlines: Privacy And Security With Vulnerable Populations’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman No, only select logs (i.e., error, security, etc.) Yes, but logs stored in different places (different apps for different use...
Ransomware Attack Disrupts IT Network at Hardenhuish School – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A UK secondary school has confirmed it was hit by a cyber-incident affecting its IT network. Hardenhuish School in Chippenham, Wiltshire,...
Global Cyber Attacks Rise by 7% in Q1 2023 – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Weekly cyber-attacks have increased worldwide by 7% in Q1 2023 compared to the same period last year, with each firm facing...
Android Apps Fail to Protect User Data During Device Transfer – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Multiple Android applications have been observed not invalidating or revalidating session cookies during app data transfer from one device to another....
Man Gets Four Years for Stealing Bitcoins Seized by Feds – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 An Ohio man has been sentenced to four years and three months behind bars after stealing 712 bitcoin ($21m), which were...
Zyxel fixed a critical RCE flaw in its firewall devices and urges customers to install the patches – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A vulnerability impacting Zyxel firewalls, tracked as CVE-2023-28771, can be exploited to execute arbitary code on vulnerable devices. Researchers from TRAPA...
Ukraine cyber police arrested a man for selling data of 300M people – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The Ukrainian cyber police arrested a Ukraine man for selling the data of over 300 million people from different countries....
Google obtained a temporary court order against CryptBot distributors – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Google obtained a temporary court order in the U.S. to disrupt the operations of the CryptBot information stealer. Google announced that...
Researchers found the first Linux variant of the RTM locker – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini RTM ransomware-as-a-service (RaaS) started offering locker ransomware that targets Linux, NAS, and ESXi systems. The Uptycs threat research team discovered the first...
SECURITY ALERT: Heimdal® Identifies Active Phishing Campaign Singleing Out Romanian Telecom Users – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Vladimir Unterfingher On the 28th of April, acting on a tip received from an anonymous source, Heimdal®’s SOC team has come across...
Managed Threat Hunting: The Next Step from Traditional Cybersecurity – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian As the world becomes increasingly digital, cybersecurity threats continue to evolve and become more sophisticated. Traditional cybersecurity measures are no...
RTM Locker Ransomware Gang Targets VMware ESXi Servers – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu RTM Locker is now the most recent enterprise-targeting ransomware operation found to be using a Linux encryptor to target virtual...
ISMG Editors: Day 4 Overview at RSA Conference 2023 – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Events , RSA Conference , RSA Conference Featured Battle Lines Being Drawn on National Cyber Strategy, Software Liability Anna Delaney (annamadeline)...
Unveiling the Power of Cyber HUMINT for Intelligence Gathering – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Intel 471’s Michael DeBolt on Why HUMINT is an Imperative, Not an Option April 27, 2023 Michael DeBolt, Chief...
Webinar | Enhance Security Investigations With ServiceNow Asset Data In Snowflake – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Thank you for registering with ISMG Complete your profile and stay up to date Need help registering? Contact Support Original Post...
New England Health Plan Still Recovering From Attack – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Finance & Banking , Fraud Management & Cybercrime , Industry Specific Point32Health Says Its Harvard Pilgrim Health Care’s IT Systems Remain...
IOTW: American Bar Association accused of data breach affecting 1.4 million peop…
In a class action lawsuit, the American Bar Association (ABA) has been accused of “grossly fail[ing] to comply with security standards” and causing a data breach...
Illumina, Feds Say Genetic Testing Gear at Risk of Hacking – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Endpoint Security , Healthcare , Industry Specific Feds Warn of Vulnerabilities Affecting Illumina’s Universal Copy Service Software Marianne Kolbasuk McGee (HealthInfoSec)...
Major UK banks including Lloyds, Halifax, TSB hit by outages – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Ax Sharma Websites and mobile apps of Lloyds Bank, Halifax, TSB Bank, and Bank of Scotland are experiencing web and mobile app outages...
Android Minecraft clones with 35M downloads infect users with adware – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A set of 38 Minecraft copycat games on Google Play infected devices with the Android adware ‘HiddenAds’ to stealthily load...
Microsoft: Windows 10 22H2 is the final version of Windows 10 – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft says Windows 10, version 22H2 will be the last feature update to be released for the Windows 10 operating...
Critical Vulnerability in Zyxel Firewalls Leads to Command Execution – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Taiwanese network equipment manufacturer Zyxel this week announced patches for a critical-severity vulnerability impacting its ATP, USG FLEX, VPN, and...
Aadya Raises $5 Million for SMB-Focused Security Platform – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Cybersecurity firm Aadya Security this week announced that it has raised $5 million in Series A funding, which brings the...
Chinese Cyberspies Delivered Malware via Legitimate Software Updates – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A Chinese APT actor tracked as Evasive Panda has been observed targeting in-country members of an international non-governmental organization (NGO)...
New ‘Atomic macOS Stealer’ Malware Offered for $1,000 Per Month – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A new piece of macOS malware named ‘Atomic macOS Stealer’, or AMOS, appears to provide a wide range of data...
Innovation Sandbox: Cybersecurity Investors Pivot to Safeguarding AI Training Models – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine News Analysis: If the winner of the RSA Innovation Sandbox says anything about the future of innovation and hype in...
Google Obtains Court Order to Disrupt CryptBot Distribution – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Google this week announced that it has obtained a court order that helped it disrupt the CryptBot information stealer’s distribution....
Big Tech Crackdown Looms as EU, UK Ready New Rules – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press TikTok, Twitter, Facebook, Google, and Amazon are facing rising pressure from European authorities as London and Brussels advanced new rules...
Microsoft: Cl0p Ransomware Exploited PaperCut Vulnerabilities Since April 13 – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A Cl0p ransomware operator affiliated with the FIN11 and TA505 threat actors has been exploiting recently patched PaperCut vulnerabilities since...