Source: www.bleepingcomputer.com – Author: Sergiu Gatlan American Airlines and Southwest Airlines, two of the largest airlines in the world, disclosed data breaches on Friday caused by the...
Day: June 24, 2023
The Week in Ransomware – June 23rd 2023 – The Reddit Files – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams It was a relatively quiet week regarding ransomware news, with the BlackCat ransomware gang extorting Reddit and the ongoing MOVEit...
University of Manchester confirms data theft in recent cyberattack – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Image: Ax Sharma The University of Manchester finally confirmed that attackers behind a cyberattack disclosed in early June had stolen...
CISA orders agencies to patch iPhone bugs abused in spyware attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Today, CISA ordered federal agencies to patch recently patched security vulnerabilities exploited as zero-days to deploy Triangulation spyware on iPhones...
FBI seizes BreachForums after arresting its owner Pompompurin in March – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan U.S. law enforcement today seized the clear web domain of the notorious BreachForums (aka Breached) hacking forum three months after...
China Likely Also Sought IP In Barracuda Attacks: Researcher – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: 1 Security News Kyle Alspach June 23, 2023, 12:03 PM EDT It appears the hackers working for the Chinese government were ‘not...
Friday Squid Blogging: Giggling Squid – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments ResearcherZero • June 23, 2023 5:30 PM ‘http://www.fortiguard.com/psirt/FG-IR-23-074 “Security experts say CISA’s directive highlights the reality that cyberspies...
UPS Data Harvested for SMS Phishing Attacks – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Jorgem • June 23, 2023 12:18 PM UPS discovered a method by which a person who searched for...
The 10 top cyber security newsletters to subscribe to right now – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Newsletters are a format that’s started to flourish. With more great stuff to read out there than ever before,...
7 CISO succession planning best practices – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Given the volume and complexity of security incidents, the need for a highly effective CISO is obvious and nearly...
News Alert: Dasera unveils new data security and governance platform for ‘Snowflake’ users – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido Mountain View, Calif. June 22, 2023 — Dasera, the premier automated data security and governance platform for top-tier finance, healthcare, and...
News Alert: Fortra researchers find email impersonation attacks climbing to an all-time high – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido Eden Prairie, Minn., June 22, 2023 — Malicious emails have reached a crescendo in 2023 according to the latest report from...
US Military Personnel Warned of Malicious Smartwatches – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Service members across the US military have reported receiving smartwatches unsolicited in the mail. These smartwatches have Wi-Fi auto-connect capabilities and can...
OpenSSH Trojan Campaign Targets IoT and Linux Systems – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Security researchers have discovered a sophisticated attack campaign that exploits custom and open-source tools to target Linux-based systems and Internet of...
USB Drives Used as Trojan Horses By Camaro Dragon – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 New versions of Chinese espionage malware have been observed spreading rapidly through infected USB drives. The malicious software tools were discovered...
ITDR Combines and Refines Familiar Cybersecurity Approaches – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jonathan Care, Contributing Writer, Dark Reading The advantages of using proactive approaches to identify threats before the attackers can cause too much...
Silobreaker Unveils Geopolitical Threat Intelligence Capabilities With RANE at Infosecurity Europe 2023 – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 London, UK – 21 June 2023 – Silobreaker, a leading security and threat intelligence technology company, has announced its enhanced geopolitical threat intelligence capabilities...
NSA: BlackLotus BootKit Patching Won’t Prevent Compromise – Source: www.darkreading.com
Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading The US National Security Agency (NSA) is urging systems administrators to go beyond patching in...
Suspicious Smartwatches Mailed to US Army Personnel – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading The US Army’s Criminal Investigation Division (CID) is warning service members to look out for unsolicited smartwatches arriving in...
Microsoft Teams Attack Skips the Phish to Deliver Malware Directly – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributor, Dark Reading A bug in the latest version of Microsoft Teams allows for external sources to send files to...
Why Legacy System Users Prioritize Uptime Over Security – Source: www.darkreading.com
Source: www.darkreading.com – Author: Evan Schuman, Contributing Writer, Dark Reading Dirk Hodgson, the director of cybersecurity for NTT Australia, tells a story. He once worked with...
Black Hat Asia 2023: Cybersecurity Maturity and Concern in Asia – Source: www.darkreading.com
Source: www.darkreading.com – Author: Zhiyee Teh, Research Associate, Cybersecurity, Omdia Cybersecurity maturity is observed to be nascent among organizations in Asia, with opportunities to make headway...
How Government Contractors & Agencies Should Navigate New Cyber Rules – Source: www.darkreading.com
Source: www.darkreading.com – Author: Matt Malarkey, VP, Strategic Alliances, Titania There are kinks in the chain — the supply chain. And after several high-profile cybersecurity breaches...
Millions of Repos on GitHub Are Potentially Vulnerable to Hijacking – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer, Dark Reading Millions of enterprise software repositories on GitHub are vulnerable to repojacking, a relatively simple kind of...
Deception Technologies Have a Maturity Problem – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dan Raywood, Senior Editor, Dark Reading INFOSEC23 — London — Deception technologies can offer a better method to detect attackers in your...
Public exploit is now available for Cisco AnyConnect VPN client – Source: www.csoonline.com
Source: www.csoonline.com – Author: Attackers could elevate privileges on systems with the vulnerable, unpatched Cisco clients, possibly taking full control. An easy-to-use exploit was publicly released...
BrandPost: Study finds Zscaler can save $2.1 million annually – Source: www.csoonline.com
Source: www.csoonline.com – Author: About | See why Zscaler’s proxy-based architecture is built on an industry-leading SSE framework to deliver superior security to secure today’s modern...
Millions of GitHub repositories vulnerable to RepoJacking: Report – Source: www.csoonline.com
Source: www.csoonline.com – Author: AquaSec analyzed a sample of 1% of GitHub repositories and found that about 37,000 of them are vulnerable to RepoJacking, including the...
New CISO appointments 2023 – Source: www.csoonline.com
Source: www.csoonline.com – Author: Keep up with news of CSO, CISO, and other senior security executive appointments. Rawpixel / Getty Images The upper ranks of corporate...
Cybercrime Group ‘Muddled Libra’ Targets BPO Sector with Advanced Social Engineering – Source:thehackernews.com
Source: thehackernews.com – Author: . Jun 23, 2023Ravie LakshmananSocial Engineering / Phishing A threat actor known as Muddled Libra is targeting the business process outsourcing (BPO)...