Several cybersecurity organizations worldwide have jointly published a new series of guidelines to aid manufacturers in prioritizing cybersecurity practices while designing products. The paper was developed...
Month: April 2023
RTM Locker Gang Targets Corporate Environments with Ransomware
The “Read The Manual” (RTM) Locker group has been observed targeting corporate environments with ransomware and forcing their affiliates to follow a strict set of rules. According...
Hyundai Experiences Cybersecurity Issues: Breach and App Bugs
Automotive manufacturer Hyundai has recently disclosed a breach that has affected an unspecified number of Italian and French car owners as well as individuals who booked...
Kodi discloses data breach after its forum was compromised
Open-source media player software provider Kodi discloses a data breach after threat actors stole its MyBB forum database. Kodi has disclosed a data breach, threat actors...
RTM Locker, a new RaaS gains notorieties in the threat landscape
Cybersecurity firm Trellix analyzed the activity of an emerging cybercriminal group called ‘Read The Manual’ RTM Locker. Researchers from cybersecurity firm Trellix have detailed the tactics,...
Hikvision fixed a critical flaw in Hybrid SAN and cluster storage products
Chinese video surveillance giant Hikvision addressed a critical vulnerability in its Hybrid SAN and cluster storage products. Chinese video surveillance giant Hikvision addressed an access control...
The Russia-linked APT29 is behind recent attacks targeting NATO and EU
Poland intelligence linked the Russian APT29 group to a series of attacks targeting NATO and European Union countries. Poland’s Military Counterintelligence Service and its Computer Emergency...
A flaw in the Kyocera Android printing app can be abused to drop malware
Security experts warn that a Kyocera Android printing app is vulnerable to improper intent handling and can be abused to drop malware. An improper intent handling issue...
EU’s Proposed CSAM Bill Poses Hacking Risks
Endpoint Security , Governance & Risk Management , Legislation & Litigation Hackers Would Exploit Client-Sider Scanning, LIBE Committee Hears Akshaya Asokan (asokan_akshaya) • April 13, 2023...
Webinar OnDemand | Expert Insights: Safeguarding Your Hybrid Workforce with 5 Key SOC Best Practices
Eric Howard Cisco Global Technical Marketing Engineer Eric Howard is a Technical Leader for Cisco’s Threat Intelligence, Detection and Response product team. He leads a team...
Exclusive Discussion | Don’t Be the Next Cyber Attack Headline!
Patrick Sullivan CTO, Security Strategy, Akamai Technologies, Inc. In his 15 years at Akamai, Patrick has held a number of leadership positions including leading the Enterprise...
Cybersecurity ‘Doom Loop’ at Crossroads
Governance & Risk Management , Patch Management Google Funds Vulnerability Disclosure Policy Group and Legal Defense for White Hats David Perera (@daveperera) • April 13, 2023...
Lead/Forward Exchange Yankee Stadium with VMware Tanzu
Presented by VMware Tanzu Businesses value and innovation are delivered through modern apps, with many organizations identifying modernization as their top initiative. From cloud native application...
Indy 500 Executive Suite with VMware Tanzu
Thank you for registering with ISMG Complete your profile and stay up to date Need help registering? Contact Support Views: 1
National Guardsman Arrested for Military, Intelligence Leaks
Cybercrime , Fraud Management & Cybercrime , Incident & Breach Response Jack Teixeira, 21, Accused of Sharing Classified National Defense Info on Discord Michael Novinson (MichaelNovinson)...
Russian APT Hackers Actively Targeting European NATO Allies
Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime European Embassies and Diplomats at Most Risk, Warns Polish CERT Akshaya Asokan (asokan_akshaya) • April 13, 2023...
New Mirai Variant Employs Uncommon Tactics to Distribute Malware
A new version of a Mirai variant called RapperBot is the latest example of malware using relatively uncommon or previously unknown infection vectors to try and...
Money Ransomware Group Enters Double-Extortion Fray
An emerging threat group dubbed Money Ransomware has adopted the increasingly popular tactic of encrypting and exfiltrating sensitive data from organizations and threatening to leak it...
Why the US Needs Quantum-Safe Cryptography Deployed Now
While it’s not easy to predict the next breakthrough, most experts estimate quantum computers with tens of thousands of qubits that can crack current encryption will...
Remcos RAT Targets Tax Pros to Scurry Off With Workers’ Filing Info
With the April 18 tax deadline approaching, hackers have been piling onto accountants’ stress with a phishing campaign designed to deliver the Remcos remote access Trojan...
Super-Yacht Specialist Lürssen in Dry Dock After Ransomware Attack
German shipbuilder Lürssen, known for making super yachts for the exorbitantly wealthy, experienced a ransomware attack over Easter weekend that has incapacitated operations. With a high...
The Internet Reform Trilemma
In policy circles, we often hear about the need for a “free,” “open,” and “secure” Internet. This was most recently the case with the White House’s...
Majority of US IT Pros Told to Keep Quiet About Data Breaches
While an increasingly number of regulations have made the reporting of data breaches mandatory, a majority of IT professionals in the United States say they have...
Legion Malware Marches onto Web Servers to Steal Credentials, Spam Mobile Users
Threat actors are selling a novel credential harvester and hacktool via a Telegram channel, which can exploit numerous Web-based services to steal credentials. It also has...
How to Define Tier-Zero Assets in Active Directory Security
Organizations trying to improve the security of their Active Directory environments face a simple problem: Attackers have too many options. The average enterprise AD environment has...
Microsoft: Phishing attack targets accountants as Tax Day approaches
Microsoft is warning of a phishing campaign targeting accounting firms and tax preparers with remote access malware allowing initial access to corporate networks. With the USA...
Microsoft: Windows LAPS is incompatible with legacy policies
Microsoft is investigating an interoperability bug between the recently added Windows Local Administrator Password Solution (LAPS) feature and legacy LAPS policies. Windows LAPS helps admins manage...
Windows 11 is getting a new ‘Presence sensing’ privacy setting
Windows 11 is getting a new privacy setting that allows users to control whether applications can detect when actively interacting with the device. This change is...
Microsoft shares fix for Outlook issue blocking access to emails
Microsoft is working on fixing an issue affecting some Outlook for Microsoft 365 customers and preventing them from accessing emails and their calendars. “After updating to...
Dutch Police mails RaidForums members to warn they’re being watched
Dutch Police is sending emails to former RaidForums members, asking them to delete stolen data and stop illegal cyber activities and warning that they are not...





























