EXECUTIVE SUMMARY: Celebrate Earth Day 2023! Cyber security professionals are recognizing the role that they can play in supporting environmental sustainability initiatives and realizing how sustainability...
Month: April 2023
RSAC Fireside Chat: Here’s why companies are increasingly turning to MSSPs for deeper help
By Byron V. Acohido Managed Security Service Providers, MSSPs, have been around for some time now as a resource to help companies operate more securely. Related:...
North Korean APT Group Now Deploying Linux Malware Variant – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Cyberwarfare / Nation-State Attacks , Endpoint Security , Fraud Management & Cybercrime Eset Says Discovery Solidifies North Korea’s Ties to 3CX...
Why Health Entities Need to Implement NIST Cyber Framework – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. NIST Standards , Standards, Regulations & Compliance Bob Bastani of HHS ASPR Describes Perks of a Strategic Approach to Managing Risk...
HHS OCR Leader: Agency Is Cracking Down on Website Trackers – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Governance & Risk Management , HIPAA/HITECH , Privacy Director Melanie Fontes Rainer on Top HIPAA Rule-Making, Enforcement Priorities Marianne Kolbasuk McGee...
ISMG Editors: Cryptocurrency Special – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Cryptocurrency Fraud , Fraud Management & Cybercrime , Video Also; 2023 DeFi Illicit Finance Risk Assessment; FinCEN’s FATF Travel Rule Anna...
Symantec: More X_Trader Supply Chain Attacks Uncovered – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. 3rd Party Risk Management , Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Energy and Financial Sector Firms Breached by...
Authentication Vendor Yubico to Go Public at $800M Valuation – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Multi-factor & Risk-based Authentication , Security Operations 80% Growth & Turning a Profit in 2022 Set Up Yubico Well While SPACs...
Shields Health Breach Exposes 2.3M Users’ Data
An unauthorized actor gained access to the systems of Shields Health Care Group (SHCG) in March, exposing driver’s license numbers as well as other identification information...
North Korea’s Kimsuky APT Keeps Growing, Despite Public Outing
Globally, interest has surged around North Korea’s Kimsuky advanced persistent threat group (a.k.a. APT43) and its hallmarks. Still, the group is showing no signs of slowing...
US Facebook users can now claim their share of $725 million Cambridge Analytica settlement
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Symantec: North Korean 3CX Hackers Also Hit Critical Infrastructure Orgs – Source: www.securityweek.com – Author: Ryan Naraine –
Source: www.securityweek.com – Author: Ryan Naraine. Category & Tags: Nation-State,Threat Intelligence,3CX,Supply Chain – Nation-State,Threat Intelligence,3CX,Supply Chain The North Korean hacking group behind the cascading supply chain...
Halcyon Secures $50M Funding for Anti-Ransomware Protection Platform – Source: www.securityweek.com – Author: Ryan Naraine –
Source: www.securityweek.com – Author: Ryan Naraine. Category & Tags: Endpoint Security,Ransomware – Endpoint Security,Ransomware Halcyon, a Texas startup building an AI-powered anti-ransomware engine to help organizations...
Abandoned WordPress Plugin Abused for Backdoor Deployment – Source: www.securityweek.com – Author: Ionut Arghire –
Source: www.securityweek.com – Author: Ionut Arghire. Category & Tags: Malware & Threats – Malware & Threats Threat actors are installing the abandoned Eval PHP plugin on...
Five Eyes Agencies Issue Cybersecurity Guidance for Smart Cities – Source: www.securityweek.com – Author: Eduard Kovacs –
Source: www.securityweek.com – Author: Eduard Kovacs. Category & Tags: Uncategorized – Uncategorized Five Eyes agencies this week issued cybersecurity guidance and best practices for smart cities....
Google Cloud Platform Vulnerability Led to Stealthy Account Backdoors – Source: www.securityweek.com – Author: Ionut Arghire –
Source: www.securityweek.com – Author: Ionut Arghire. Category & Tags: Vulnerabilities,vulnerability – Vulnerabilities,vulnerability A vulnerability in Google Cloud Platform (GCP) could have allowed attackers to maliciously change...
GitHub Announces New Security Improvements – Source: www.securityweek.com – Author: Ionut Arghire –
Source: www.securityweek.com – Author: Ionut Arghire. Category & Tags: Application Security,GitHub – Application Security,GitHub Microsoft-owned code hosting platform GitHub this week introduced NPM package provenance and...
House Committee Hears Testimony on DC Health Data Breach – Source: www.securityweek.com – Author: Associated Press –
Source: www.securityweek.com – Author: Associated Press. Category & Tags: Data Breaches,data breach,data leak,healthcare – Data Breaches,data breach,data leak,healthcare A top administrator with Washington’s health insurance exchange...
Capita Confirms Data Breach After Ransomware Group Offers to Sell Stolen Information – Source: www.securityweek.com – Author: Eduard Kovacs –
Source: www.securityweek.com – Author: Eduard Kovacs. Category & Tags: Data Breaches,Ransomware,data breach,Featured,ransomware – Data Breaches,Ransomware,data breach,Featured,ransomware UK-based business process outsourcing and professional services company Capita has...
DevSecOps: AI is reshaping developer roles, but it’s not all smooth sailing
Image: Murrstock/Adobe Stock New DevSecOps research by GitLab suggests that 65% of developers are using artificial intelligence and machine learning in their code testing efforts or...
3CX Breach Was a Double Supply Chain Compromise
We learned some remarkable new details this week about the recent supply-chain attack on VoIP software provider 3CX. The lengthy, complex intrusion has all the makings of...
Training New Hires on Security: Strategies for Success
The rise of cyberthreats and the growing complexity of the IT threat landscape means security training for all organizations must be a paramount concern. Instilling a...
Attackers using AI to enhance conversational scams over mobile devices
Attackers are using artificial intelligence (AI) to enhance conversational scams, such as the so-called “pig butchering” social engineering scams, over mobile devices. Instead of just using...
An Iranian hacking group went on the offensive against U.S. targets, Microsoft says
Welcome to The Cybersecurity 202! Just when I think I’ve seen every amazing octopus video, I stumble across something like this. I will probably never catch...
The Week in Ransomware – April 21st 2023 – Macs in the Crosshairs
A lot of news broke this week related to ransomware, with the discovery of LockBit testing macOS encryptors to an outage on NCR, causing massive headaches...
Critical infrastructure also hit by supply chain attack behind 3CX breach
The X_Trader software supply chain attack that led to last month’s 3CX breach has also impacted at least several critical infrastructure organizations in the United States...
GhostToken GCP flaw let attackers backdoor Google accounts
Google has addressed a Cloud Platform (GCP) security vulnerability impacting all users and allowing attackers to backdoor their accounts using malicious OAuth applications installed from the...
Kubernetes RBAC abused to create persistent cluster backdoors
Hackers use a novel method involving RBAC (Role-Based Access Control) to create persistent backdoor accounts on Kubernetes clusters and hijack their resources for Monero crypto-mining. RBAC...
American Bar Association data breach hits 1.4 million members
The American Bar Association (ABA) has suffered a data breach after hackers compromised its network and gained access to older credentials for 1,466,000 members. The ABA...
University websites using MediaWiki, TWiki hacked to serve Fortnite spam
Websites of multiple U.S. universities are serving Fortnite and ‘gift card’ spam. Researchers observed Wiki and documentation pages being hosted by universities including Stanford, MIT, Berkeley, UMass Amherst, Northeastern, Caltech, among others,...




























