Source: heimdalsecurity.com – Author: Vladimir Unterfingher On the 28th of April, acting on a tip received from an anonymous source, Heimdal®’s SOC team has come across...
Month: April 2023
Managed Threat Hunting: The Next Step from Traditional Cybersecurity – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian As the world becomes increasingly digital, cybersecurity threats continue to evolve and become more sophisticated. Traditional cybersecurity measures are no...
RTM Locker Ransomware Gang Targets VMware ESXi Servers – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu RTM Locker is now the most recent enterprise-targeting ransomware operation found to be using a Linux encryptor to target virtual...
ISMG Editors: Day 4 Overview at RSA Conference 2023 – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Events , RSA Conference , RSA Conference Featured Battle Lines Being Drawn on National Cyber Strategy, Software Liability Anna Delaney (annamadeline)...
Unveiling the Power of Cyber HUMINT for Intelligence Gathering – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Intel 471’s Michael DeBolt on Why HUMINT is an Imperative, Not an Option April 27, 2023 Michael DeBolt, Chief...
Webinar | Enhance Security Investigations With ServiceNow Asset Data In Snowflake – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Thank you for registering with ISMG Complete your profile and stay up to date Need help registering? Contact Support Original Post...
IOTW: American Bar Association accused of data breach affecting 1.4 million peop…
In a class action lawsuit, the American Bar Association (ABA) has been accused of “grossly fail[ing] to comply with security standards” and causing a data breach...
New England Health Plan Still Recovering From Attack – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Finance & Banking , Fraud Management & Cybercrime , Industry Specific Point32Health Says Its Harvard Pilgrim Health Care’s IT Systems Remain...
Illumina, Feds Say Genetic Testing Gear at Risk of Hacking – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Endpoint Security , Healthcare , Industry Specific Feds Warn of Vulnerabilities Affecting Illumina’s Universal Copy Service Software Marianne Kolbasuk McGee (HealthInfoSec)...
Major UK banks including Lloyds, Halifax, TSB hit by outages – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Ax Sharma Websites and mobile apps of Lloyds Bank, Halifax, TSB Bank, and Bank of Scotland are experiencing web and mobile app outages...
Android Minecraft clones with 35M downloads infect users with adware – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A set of 38 Minecraft copycat games on Google Play infected devices with the Android adware ‘HiddenAds’ to stealthily load...
Microsoft: Windows 10 22H2 is the final version of Windows 10 – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft says Windows 10, version 22H2 will be the last feature update to be released for the Windows 10 operating...
Critical Vulnerability in Zyxel Firewalls Leads to Command Execution – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Taiwanese network equipment manufacturer Zyxel this week announced patches for a critical-severity vulnerability impacting its ATP, USG FLEX, VPN, and...
Aadya Raises $5 Million for SMB-Focused Security Platform – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Cybersecurity firm Aadya Security this week announced that it has raised $5 million in Series A funding, which brings the...
Chinese Cyberspies Delivered Malware via Legitimate Software Updates – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A Chinese APT actor tracked as Evasive Panda has been observed targeting in-country members of an international non-governmental organization (NGO)...
New ‘Atomic macOS Stealer’ Malware Offered for $1,000 Per Month – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A new piece of macOS malware named ‘Atomic macOS Stealer’, or AMOS, appears to provide a wide range of data...
Innovation Sandbox: Cybersecurity Investors Pivot to Safeguarding AI Training Models – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine News Analysis: If the winner of the RSA Innovation Sandbox says anything about the future of innovation and hype in...
Google Obtains Court Order to Disrupt CryptBot Distribution – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Google this week announced that it has obtained a court order that helped it disrupt the CryptBot information stealer’s distribution....
Big Tech Crackdown Looms as EU, UK Ready New Rules – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press TikTok, Twitter, Facebook, Google, and Amazon are facing rising pressure from European authorities as London and Brussels advanced new rules...
Microsoft: Cl0p Ransomware Exploited PaperCut Vulnerabilities Since April 13 – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A Cl0p ransomware operator affiliated with the FIN11 and TA505 threat actors has been exploiting recently patched PaperCut vulnerabilities since...
RSA Conference 2023 – Announcements Summary (Day 3) – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in...
Many Public Salesforce Sites are Leaking Private Data – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs A shocking number of organizations — including banks and healthcare providers — are leaking private and sensitive information from their public...
Tessian Fully Integrates With M365 To Provide Threat Protection and Insider Risk Protection – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 BOSTON, April 25, 2023 /PRNewswire/ — Tessian, a leading Integrated Cloud Email Security company, today announced the release of a new M365 Add-in, simplifying the...
MajorKey Accelerates Pureplay Information Security Strategy With Acquisition of Legion Star – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 CHICAGO, April 26, 2023 /PRNewswire/ — MajorKey Technologies today announced the acquisition of Legion Star, a Chicago-based cloud security and identity management business, in...
Delinea Onsite RSA Conference Survey Reveals Cloud Security Remains Top Cybersecurity Concern in 2023 – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 SAN FRANCISCO, April 27, 2023 /PRNewswire/ — Delinea, a leading provider of solutions that seamlessly extend Privileged Access Management (PAM), today announced the results...
CISO Survival Guide for Cyberattacks – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Editor, Dark Reading RSA CONFERENCE 2023 – San Francisco – The difference between a cyber crisis and any other type...
‘Anonymous Sudan’ Claims Responsibility for DDoS Attacks Against Israel – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading A religious hacktivist group known as Anonymous Sudan has claimed responsibility for the distributed denial-of-service (DDoS) attacks...
Threat Actor Names Proliferate, Adding Confusion – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer, Dark Reading The cyberattackers conducting espionage operations on behalf of Iran’s Islamic Revolutionary Guard Corps have been known...
Lazarus, Scarcruft North Korean APTs Shift Tactics, Thrive – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading North Korean state advanced persistent threats (APTs) are evolving: developing new payloads; modifying their tactics, techniques,...
China’s ‘Evasive Panda’ Hijacks Software Updates to Deliver Custom Backdoor – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributor, Dark Reading A Chinese advanced persistent threat (APT) group is hijacking legitimate application update channels for software developed by...