Source: securityboulevard.com – Author: Carolynn van Arsdale Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the...
Day: May 25, 2023
U.S.-South Korea Forge Strategic Cybersecurity Framework – Source: securityboulevard.com
Source: securityboulevard.com – Author: Christopher Burgess The United States and South Korea have crafted a “Strategic Cybersecurity Cooperation Framework.” The framework is part of recent bilateral...
SCA, SBOM, Vulnerability Management, SAST, or DAST Tools: Which Is Best for Your Team? – Source: securityboulevard.com
Source: securityboulevard.com – Author: David Brumley There are a lot of options for software security testing tools. How do you know which ones are right for...
2023 State of the Threat for eCommerce and Travel – Source: securityboulevard.com
Source: securityboulevard.com – Author: Ashish Jain In 2022, Arkose Labs performed a comprehensive analysis of current threats across multiple industries to pinpoint the frequency and types...
Mitigating OT Security Risks: Focusing on Solutions, not Products – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Michelle Balderson of OTORIO on How OT Security Is Now Perceived as a Business Risk May 25, 2023 Michelle...
CyberArk CEO Touts New Browser That Secures Privileged Users – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 CyberArk’s new Secure Browser prevents adversaries from harvesting the credentials of privileged users who are accessing sensitive web applications, said CEO...
Mass Exploitation of Zyxel Network Appliances Underway – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 DDoS Protection , Security Operations Mirai Botnet Targets Now-Patched Zyxel Flaw Mathew J. Schwartz (euroinfosec) • May 25, 2023 ...
Key Strategies for Secure Access to Private Apps – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Thank you for registering with ISMG Complete your profile and stay up to date Need help registering? Contact Support Original Post...
Chinese State Hacker ‘Volt Typhoon’ Targets Guam and US – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Cyberwarfare / Nation-State Attacks , Endpoint Security , Fraud Management & Cybercrime Targets Are Critical Infrastructure – Likely for Cyberespionage, Long-Term...
North Korean APT Group Kimsuky Shifting Attack Tactics – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Kimsuky Focuses on Exfiltration in Latest Campaign Prajeet Nair (@prajeetspeaks) • May...
Shedding light on AceCryptor and its operation – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Jakub Kaloč ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families In this...
Drop in Insider Breaches Drives Decline in Intrusions at OT Organizations – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The 2023 State of Operational Technology and Cybersecurity Report published on Wednesday by Fortinet shows a drop in the number...
GitLab Security Update Patches Critical Vulnerability – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire DevOps platform GitLab this week resolved a critical-severity vulnerability impacting both GitLab Community Edition (CE) and Enterprise Edition (EE). An...
Zero-Day Vulnerability Exploited to Hack Barracuda Email Security Gateway Appliances – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Security, application delivery and data protection solutions provider Barracuda Networks is warning customers about a zero-day vulnerability that has been...
Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Microsoft says it has caught Chinese state-backed hackers siphoning data from critical infrastructure organizations in Guam, a U.S. territory in...
Biden Picks New NSA Head, Key to Support of Ukraine, Defense of US Elections – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press WASHINGTON (AP) — President Joe Biden has chosen a new leader for the National Security Agency and U.S. Cyber Command,...
Researchers Spot APTs Targeting Small Business MSPs – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Security researchers at Proofpoint have spotted signs of advanced threat actors targeting small- and medium-sized businesses and the service providers...
Apria Loses Financial Data of Nearly Two Million Customers Due to Cyberattack – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Threat actors breached Apria`s Healthcare LLC system and stole the credit card data of 1,869,598 patients and employees. Apria is...
OAuth Vulnerabilities in Widely Used Expo Framework Allowed Account Takeovers – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs OAuth-related vulnerabilities found in the widely used application development framework Expo could have been exploited to take control of user...
Android App With 50,000 Downloads in Google Play Turned Into Spyware via Update – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A screen recording application that had amassed more than 50,000 downloads in Google Play was trojanized via an update last...
IOTW: Luxottica confirms 2021 data leak of 70 million customers’ information
Italian eyewear brand Luxottica, parent company of Ray-Ban and Oakley, has confirmed that the data of more than 70 million customers was accessed in 2021. The...
83C0000B: The error code that means a dodgy software update bricked your HP printer – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley Since earlier this month some owners of HP OfficeJet printers have been reporting that they are faced with a blue...
Addigy exposes RSR updates gap in 25% of managed macOS devices – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Franklin Okeke Addigy released a report that Apple RSR updates are not being deployed in about 25% of macOS devices within managed...
Spearphishing report: 50% of companies were impacted in 2022 – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Image: ronstik/Adobe Stock Spearphishing is a sliver of all email exploits, but the extent to which it succeeds is revealed...
North Korean APT Group Kimsuky Shifting Attack Tactics – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Kimsuky Focuses on Exfiltration In Latest Campaign Prajeet Nair (@prajeetspeaks) • May...
Capita Issued Erroneous Breach Details, Officials Report – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Fraud Management & Cybercrime , General Data Protection Regulation (GDPR) , Incident & Breach Response Local Authority Finds Sensitive Data Was...
CyberArk CEO Touts New Browser That Secures Privileged Users – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 CyberArk’s new Secure Browser prevents adversaries from harvesting the credentials of privileged users who are accessing sensitive web applications, said CEO...
Chinese State Hacker ‘Volt Typhoon’ Targets Guam and US – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Cyberwarfare / Nation-State Attacks , Endpoint Security , Fraud Management & Cybercrime Targets Are Critical Infrastructure – Likely for Cyberespionage, Long-Term...
Key Strategies for Secure Access to Private Apps – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Thank you for registering with ISMG Complete your profile and stay up to date Need help registering? Contact Support Original Post...
CommonSpirit Ups Cost Estimate on Its 2022 Ransomware Breach – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Cyber Insurance , Fraud Management & Cybercrime , Governance & Risk Management Company Executive Hopes Insurance Will Help Cover Most Costs...