Source: www.schneier.com – Author: Bruce Schneier A Peruvian oversight law has the opposite effect: Peru in 2020 began requiring any foreign fishing boat entering its ports...
Day: May 20, 2023
Security Risks of New .zip and .mov Domains – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Hauke • May 19, 2023 8:11 AM I may be dating myself here, but I don’t remember a...
The Week in Ransomware – May 19th 2023 – A Shifting Landscape – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams In the ever-shifting ransomware landscape, we saw new ransomware gangs emerge, threat actors return from a long absence, operations shifting...
CISA warns of Samsung ASLR bypass flaw exploited in attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan CISA warned today of a security vulnerability affecting Samsung devices used in attacks to bypass Android address space layout randomization...
Microsoft: Notorious FIN7 hackers return in Clop ransomware attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan A financially motivated cybercriminal group known as FIN7 resurfaced last month, with Microsoft threat analysts linking it to attacks where...
ASUS routers knocked offline worldwide by bad security update – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas ASUS has apologized to its customers for a server-side security maintenance error that has caused a wide range of impacted...
Dish Network likely paid ransom after recent ransomware attack – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Dish Network, an American television provider, most likely paid a ransom after being hit by a ransomware attack in February...
Three New Zero-Day Vulnerabilities Fixed By Apple – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Apple resolves three new zero-day vulnerabilities used to compromise iPhones and Macs. The flaws were all found in the multi-platform...
Legitimate looking npm packages found hosting TurkoRat infostealer – Source: www.csoonline.com
Source: www.csoonline.com – Author: The malicious packages have been downloaded hundreds of times, but the long-term impact is unknown.
Guerrilla malware is preinfected on 8.9 million Android devices, Trend Micro says – Source: www.csoonline.com
Source: www.csoonline.com – Author: Guerilla malware, distributed by cybercrime gang Lemon Group, can load additional payloads, intercept one-time passwords from SMS texts, set up a reverse...
The real cost of a free lunch – Week in security with Tony Anscombe – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Editor Don’t download software from non-reputable websites and sketchy links – you might be in for more than you bargained for Chances...
February cyber incident will cost molten metal flow engineering firm Vesuvius £3.5 million – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Vesuvius, a leader in molten metal flow engineering and technology, revealed that the February cyber incident will cost it £3.5...
NPM packages found containing the TurkoRat infostealer – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Experts discovered two malicious packages in the npm package repository, both were laced with an open-source info-stealer called TurkoRat. ReversingLabs discovered...
Lemon Group gang pre-infected 9 million Android devices for fraudulent activities – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The Lemon Group cybercrime ring has reportedly pre-installed malware known as Guerilla on almost 9 million Android devices. A cybercrime...
Apple fixed three new actively exploited zero-day vulnerabilities – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Apple released security updates to address three zero-day vulnerabilities in iPhones, Macs, and iPads that are actively exploited in attacks....