Source: thehackernews.com – Author: . Jun 02, 2023Ravie LakshmananCyber Espionage / APT U.S. and South Korean intelligence agencies have issued a new alert warning of North...
Month: June 2023
MOVEit Transfer Under Attack: Zero-Day Vulnerability Actively Being Exploited – Source:thehackernews.com
Source: thehackernews.com – Author: . Jun 02, 2023Ravie Lakshmanan Zero-Day / Vulnerability A critical flaw in Progress Software’s in MOVEit Transfer managed file transfer application has...
Insurers Predict $33bn Bill for Catastrophic “Cyber Event” – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A catastrophic “once-in-200-years” cyber event could cause $33bn in losses for the cyber-insurance sector, according to a new report from Guy...
Chinese Phishing Gang “PostalFurious” Expands Campaign – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A recently discovered Chinese phishing gang has expanded its campaigns to the Middle East with new scams designed to harvest personal...
Kaspersky Says it is Being Targeted By Zero-Click Exploits – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Russian AV vendor Kaspersky has claimed that iOS devices on its network are being targeted by sophisticated zero-day exploits. The firm...
Amazon Pays $30.8M to Settle Ring Spying & Alexa Privacy Lawsuits – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Because of the complaints made by the Federal Trade Commission (FTC), Amazon has agreed to pay a...
Jetpack WordPress Plug-in API Bug Triggers Mass Updates – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Jetpack, a WordPress plug-in for boosting website security and speed has issued a critical update following a...
How Do I Reduce Security Tool Sprawl in My Environment? – Source: www.darkreading.com
Source: www.darkreading.com – Author: Yotam Segev, Co-Founder and CEO, Cyera Question: We have too many security tools. How do I consolidate and reduce tool sprawl in...
Sustained ‘Red Deer’ Phishing Attacks Impersonate Israel Post, Drop RATs – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dan Raywood, Senior Editor, Dark Reading Israeli engineering and telecommunications companies have been targeted with a sustained phishing message campaign that is...
Google Drive Deficiency Allows Attackers to Exfiltrate Workspace Data Without a Trace – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributor, Dark Reading A lack of event logging in the free-subscription version of Google Workspace can allow attackers to download...
Where SBOMs Stand Today – Source: www.darkreading.com
Source: www.darkreading.com – Author: Liran Tancman, CEO & Co-Founder, Rezilion What a difference two years makes. Around this time in 2021, the term “SBOM” — which...
Novel PyPI Malware Uses Compiled Python Bytecode to Evade Detection – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading In a new twist on software supply chain attacks, researchers have discovered a Python package hiding...
Horabot Campaign Targets Spanish-Speaking Users in the Americas – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A new cyber threat campaign named “Horabot” has been discovered by cybersecurity firm Cisco Talos targeting Spanish-speaking users in the Americas. Horabot,...
Void Rabisu’s RomCom Backdoor Reveals Shifting Threat Actor Goals – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The hacking group known as Void Rabisu has deployed a new backdoor called RomCom. According to security researchers at Trend Micro,...
Potential Backdoor in Gigabyte PCs Exposes Supply Chain Risks – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Cybersecurity firm Eclypsium has uncovered a potential backdoor in Gigabyte systems, raising concerns about the security of the technology supply chain....
ISACA pledges to help grow cybersecurity workforce in Europe – Source: www.csoonline.com
Source: www.csoonline.com – Author: ISACA will provide 20,000 free memberships to students across Europe and support the identification of qualified cybersecurity candidates for organizations. IT Stone...
BigID wants to let you tweak your data classifications manually – Source: www.csoonline.com
Source: www.csoonline.com – Author: Sailing the seas of enterprise data may get easier, with BigID’s latest release. The company hopes to make discovery simpler by letting...
What is the Cybercrime Atlas? How it can help disrupt cybercrime – Source: www.csoonline.com
Source: www.csoonline.com – Author: The Cybercrime Atlas aims to map the cybercriminal ecosystem worldwide and allow global law enforcement agencies to access that information when fighting...
New Horabot campaign takes over victim’s Gmail, Outlook accounts – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A previously unknown campaign involving the Hotabot botnet malware has targeted Spanish-speaking users in Latin America since at least November...
Windows 11 will let you view phone photos in File Explorer – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft is now rolling out a new Windows 11 dev build allowing Insiders to view their phone’s camera roll in...
Harvard Pilgrim Health Care ransomware attack hits 2.5 million people – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Harvard Pilgrim Health Care (HPHC) has disclosed that a ransomware attack it suffered in April 2023 impacted 2,550,922 people, with...
Russia says US hacked thousands of iPhones in iOS zero-click attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Russian cybersecurity firm Kaspersky says some iPhones on its network were hacked using an iOS vulnerability that installed malware via...
Google triples rewards for Chrome sandbox escape chain exploits – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Google announced today that bug bounty hunters who report sandbox escape chain exploits targeting its Chrome web browser are now...
New MOVEit Transfer zero-day mass-exploited in data theft attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams Hackers are actively exploiting a zero-day vulnerability in the MOVEit Transfer file transfer software to steal data from organizations. MOVEit...
Russia Blames US Intelligence for iOS Zero-Click Attacks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Russian anti-malware vendor Kaspersky on Thursday said it discovered an APT actor launching zero-click iMessage exploits on iOS-powered devices in...
Toyota Discloses New Data Breach Involving Vehicle, Customer Information – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Japanese car maker Toyota this week announced that cloud configuration issues have led to years-long exposure of customer data. The...
Cisco Acquiring Armorblox for Predictive and Generative AI Technology – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Cisco on Wednesday announced that it’s acquiring California-based cybersecurity firm Armorblox for its artificial intelligence (AI) technology. Armorblox specializes in...
Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Organizations using Moxa’s MXsecurity product have been informed about two potentially serious vulnerabilities that could be exploited by malicious hackers...
Amazon Settles Ring Customer Spying Complaint – Source: www.securityweek.com
Source: www.securityweek.com – Author: AFP Amazon on Wednesday agreed to pay $30.8 million to settle Ring and Alexa privacy complaints filed by US regulators, including accusations...
Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Some organizations can expose sensitive personal and corporate information by failing to properly deactivate Salesforce Community websites that are no...





























