Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido The ransomware plague endures — and has arisen as a potent weapon in geopolitical conflicts. Related: The...
Month: May 2023
US Teenager Indicted for Credential Stuffing Attack on Fantasy Sports Website – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A Wisconsin teenager has been charged with accessing tens of thousands of user accounts at a fantasy sports and betting...
Pimcore Platform Flaws Exposed Users to Code Execution – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Security researchers are warning that vulnerabilities patched in the open-source Pimcore platform could have led to the execution of arbitrary...
2022 Purple Knight Report – Facing the Unknown – Uncoverging & Addressing Systemic Active Directory Security Failures by Purple Knight
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
CommonMagic APT Campaign Broadens Target Scope to Central and Western Ukraine – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 Woburn, MA – May 19, 2023 – Kaspersky researchers have provided further details on the CommonMagic campaign, which was first observed...
Apple Patches 3 Zero-Days Possibly Already Exploited – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Three zero-day vulnerabilities — tracked as CVE-2023-32409, CVE-2023-28204, and CVE-2023-32373 — were found in Apple’s WebKit browser...
3 Common Initial Attack Vectors Account for Most Ransomware Campaigns – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer, Dark Reading Most ransomware attackers use one of three main vectors to compromise networks and gain access to...
AppSec Teams Stuck in Catch-Up Cycle Due to Massive Cloud-Native Enablement Gap – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 Tel Aviv, May 17, 2023 – Backslash Security, the new cloud-native application security solution for enterprise AppSec teams, today released a...
Phishing Vendor Sells IP Addresses to Duck Anomaly Detection – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Business Email Compromise (BEC) , Fraud Management & Cybercrime BulletProofLink Found A Way To Thewart Impossible Travel Detection Prajeet Nair (@prajeetspeaks)...
Zero Trust Authentication: Foundation of Zero Trust Security – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Governance & Risk Management , Remote Workforce , Zero Trust Beyond Identity’s Husnain Bajwa on a Solution That Supports Zero Trust...
Cyberattacks on Taiwan Surge Amid Chinese Aggression – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Surge In PlugX Malware Use Points Towards Chinese Nation-State Activity Jayant Chakravarti...
Apple Fixes 3 Zero-Days Exploited in the Wild – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Endpoint Security , Governance & Risk Management , Patch Management Vulnerabilities Exist in Apple-Mandated WebKit Browser Engine Mihir Bagwe (MihirBagwe) ,...
The FTC Pushes Boundaries With Proposed Health Rule Change – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Governance & Risk Management , Privacy , Standards, Regulations & Compliance Consumer Health Data Needs More Protections – Is the FTC...
Friday Squid Blogging: Peruvian Squid-Fishing Regulation Drives Chinese Fleets Away – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier A Peruvian oversight law has the opposite effect: Peru in 2020 began requiring any foreign fishing boat entering its ports...
Security Risks of New .zip and .mov Domains – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Hauke • May 19, 2023 8:11 AM I may be dating myself here, but I don’t remember a...
The Week in Ransomware – May 19th 2023 – A Shifting Landscape – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams In the ever-shifting ransomware landscape, we saw new ransomware gangs emerge, threat actors return from a long absence, operations shifting...
CISA warns of Samsung ASLR bypass flaw exploited in attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan CISA warned today of a security vulnerability affecting Samsung devices used in attacks to bypass Android address space layout randomization...
Microsoft: Notorious FIN7 hackers return in Clop ransomware attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan A financially motivated cybercriminal group known as FIN7 resurfaced last month, with Microsoft threat analysts linking it to attacks where...
ASUS routers knocked offline worldwide by bad security update – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas ASUS has apologized to its customers for a server-side security maintenance error that has caused a wide range of impacted...
Dish Network likely paid ransom after recent ransomware attack – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Dish Network, an American television provider, most likely paid a ransom after being hit by a ransomware attack in February...
Three New Zero-Day Vulnerabilities Fixed By Apple – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Apple resolves three new zero-day vulnerabilities used to compromise iPhones and Macs. The flaws were all found in the multi-platform...
Legitimate looking npm packages found hosting TurkoRat infostealer – Source: www.csoonline.com
Source: www.csoonline.com – Author: The malicious packages have been downloaded hundreds of times, but the long-term impact is unknown.
Guerrilla malware is preinfected on 8.9 million Android devices, Trend Micro says – Source: www.csoonline.com
Source: www.csoonline.com – Author: Guerilla malware, distributed by cybercrime gang Lemon Group, can load additional payloads, intercept one-time passwords from SMS texts, set up a reverse...
The real cost of a free lunch – Week in security with Tony Anscombe – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Editor Don’t download software from non-reputable websites and sketchy links – you might be in for more than you bargained for Chances...
February cyber incident will cost molten metal flow engineering firm Vesuvius £3.5 million – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Vesuvius, a leader in molten metal flow engineering and technology, revealed that the February cyber incident will cost it £3.5...
NPM packages found containing the TurkoRat infostealer – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Experts discovered two malicious packages in the npm package repository, both were laced with an open-source info-stealer called TurkoRat. ReversingLabs discovered...
Lemon Group gang pre-infected 9 million Android devices for fraudulent activities – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The Lemon Group cybercrime ring has reportedly pre-installed malware known as Guerilla on almost 9 million Android devices. A cybercrime...
Apple fixed three new actively exploited zero-day vulnerabilities – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Apple released security updates to address three zero-day vulnerabilities in iPhones, Macs, and iPads that are actively exploited in attacks....
Take action now to avoid BianLian ransomware attacks, US Government warns organisations – Source: www.tripwire.com
Source: www.tripwire.com – Author: Graham Cluley The US Cybersecurity and Infrastructure Security Agency (CISA), FBI, and others have issued a joint alert, advising organisations of the...
CloudWizard APT: the bad magic story goes on – Source: securelist.com
Source: securelist.com – Author: Leonid Bezvershenko, Georgy Kucherin, Igor Kuznetsov In March 2023, we uncovered a previously unknown APT campaign in the region of the Russo-Ukrainian...















