Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading The Wemo Mini Smart Plug V2, which allows users to remotely control anything plugged into...
Day: May 17, 2023
Attackers Target macOS With ‘Geacon’ Cobalt Strike Tool – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer, Dark Reading Heads up: threat actors are now deploying a Go-language implementation of Cobalt Strike called Geacon that...
XM Cyber Announces Partnership With SAP to Deliver Robust Security for Hybrid Environments – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 HERZLIYA, Israel, May 16, 2023 /PRNewswire/ — XM Cyber, the leader in hybrid cloud security, today announced its strategic partnership with SAP. Leveraging the capabilities of...
Russian Ransomware Perp Charged After High-Profile Hive, Babuk & LockBit Hits – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Russian national Mikahail Pavlovich Matveev has been charged by the US Department of Justice (DoJ) for launching...
Qilin Ransomware Operation Outfits Affiliates With Sleek, Turnkey Cyberattacks – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Ransomware-as-a-service (RaaS) operation Qilin has been arming its affiliates with malware and supporting services to target education,...
Name That Toon: One by One – Source: www.darkreading.com
Source: www.darkreading.com – Author: John Klossner, Cartoonist Your marching orders are simple: Come up with a clever cybersecurity-related caption for the cartoon above. Now comes the...
Circle Security Technology Partnership With ForgeRock to Accelerate the Prevention-First Era in Digital Security – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 SAN FRANCISCO, May 16, 2023 /PRNewswire/ — Circle Security, a transformative cybersecurity platform purpose-built for threat prevention powered by a decentralized cryptographic architecture, is pleased...
Russian Hacker “Wazawaka” Indicted for Ransomware – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs A Russian man identified by KrebsOnSecurity in January 2022 as a prolific and vocal member of several top ransomware groups was...
Re-Victimization from Police-Auctioned Cell Phones – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs Countless smartphones seized in arrests and searches by police forces across the United States are being auctioned online without first having...
Hackers use Azure Serial Console for stealthy access to VMs – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A financially motivated cybergang tracked by Mandiant as ‘UNC3944’ is using phishing and SIM swapping attacks to hijack Microsoft Azure...
New ZIP domains spark debate among cybersecurity experts – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams Cybersecurity researchers and IT admins have raised concerns over Google’s new ZIP and MOV Internet domains, warning that threat actors...
Microsoft investigates slow Windows VPN speeds after May updates – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft is investigating major speed issues affecting L2TP/IPsec VPN connections after installing recent Windows 11 updates. According to reports from...
GitHub reveals reason behind last week’s string of outages – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan GitHub’s Chief Security Officer and SVP of Engineering shared more details today on a string of outages that hit the...
Apple blocked 1.7 million apps for privacy, security issues in 2022 – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Apple’s App Store team prevented more than $2 billion in transactions tagged as potentially fraudulent and blocked almost 1.7 million app...
Hackers infect TP-Link router firmware to attack EU entities – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A Chinese state-sponsored hacking group named “Camaro Dragon” infects residential TP-Link routers with a custom “Horse Shell” malware used to...
Russian ransomware affiliate charged with attacks on critical infrastructure – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan The U.S. Justice Department has filed charges against a Russian citizen named Mikhail Pavlovich Matveev (also known as Wazawaka, Uhodiransomwar, m1x,...
Ransomware Prevention – Are Meeting Password Security Requirements Enough – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software As ransomware attacks continue to wreak havoc on organizations worldwide, many official standards and regulations have been established...
Parental control app with 5 million downloads vulnerable to attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Kiddowares ‘Parental Control – Kids Place’ app for Android is impacted by multiple vulnerabilities that could enable attackers to upload...
Open-source Cobalt Strike port ‘Geacon’ used in macOS attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Geacon, a Go-based implementation of the beacon from the widely abused penetration testing suite Cobalt Strike, is being used more and more...
PharMerica Cyber Incident Exposes 5.8 M People’s Data – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Madalina Popovici PharMerica, the second largest provider of institutional pharmacy services in the United States, confirmed that it suffered a data breach...
Consolidating Your Security Operations with Automated Threat Hunting (The Simplified Handbook) – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Vladimir Unterfingher Previously, we have touched upon the finer points of creating and implementing your very first threat-hunting framework. Now that you’ve...
IBM snags Polar Security to boost cloud data practice – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg IBM acquired the Israeli firm founded in 2021 to grow its relevance in the nascent realm of data security posture...
Sticking to traditional security playbook is mistake for cloud security: Palo Alto Networks SVP – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Image: Rafael Henrique/Adobe Stock Worldwide spending on public cloud services is set to grow 20.7% to total $591.8 billion in...