Source: www.securityweek.com – Author: Eduard Kovacs Several major companies have published security advisories in response to the recently disclosed Intel CPU vulnerability named Downfall. Discovered by...
Month: August 2023
Israel, US to Invest $4 Million in Critical Infrastructure Security Projects – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Government agencies in Israel and the US have announced plans to invest $3.85 million in projects meant to improve the...
Federally Insured Credit Unions Required to Report Cyber Incidents Within 3 Days – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The National Credit Union Administration (NCUA) is updating cyberattack reporting rules, requiring all federally insured credit unions to report incidents...
Africa Cyber Surge II: $40 million, 20,000 networks & 25 countries – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: The Africa Cyber Surge II operation has led to the take-down of rogue networks that were responsible for financial...
A third of companies hit with ransomware didn’t have to pay…Here’s how they did it – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Pete Nicoletti, Check Point Field CISO, Americas One in ten victims of ransomware pay ransoms of over $1 million. With...
QR Code Campaign Targets Major Energy Firm – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A significant phishing campaign employing QR codes has recently come to light, with a major US-based energy company as one of...
Cybersecurity Study Reveals Web App Vulnerability Crisis – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A recent cybersecurity study has brought to light a concerning vulnerability crisis affecting web applications. CyCognito’s semi-annual State of External Exposure...
Interpol-Led Africa Cyber Surge II Nets 14 Cybercrime Suspects – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A collaborative effort led by Interpol, known as Africa Cyber Surge II, has yielded significant results in combating cybercrime across the...
UK’s AI Safety Summit Scheduled For Early November – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The UK’s much-anticipated summit on AI safety will reportedly be held in November, with cybersecurity experts welcoming the government’s focus on...
Chinese Hackers Use DLL Hijacking to Target Asian Gamblers – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Security researchers have spotted a new Chinese espionage campaign targeting Asian gambling companies, which they suspect is the work of the...
Proxyjacking and Cryptomining Campaign Targets GitLab – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Security researchers have discovered a new financially motivated cyber-threat campaign designed to make money from cryptomining and proxyjacking while staying hidden...
WinRAR flaw enables remote code execution of arbitrary code – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A flaw impacting the file archiver utility for Windows WinRAR can allow the execution of commands on a computer by...
#OpFukushima: Anonymous group protests against the plan to dump Fukushima RADIOACTIVE wastewater into Pacific – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini #OpFukushima: The famous collective Anonymous has launched cyberattacks against Japan nuclear websites over Fukushima water plan. The hacker collective Anonymous...
Massive phishing campaign targets users of the Zimbra Collaboration email server – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A massive social engineering campaign is targeting users of the Zimbra Collaboration email server to steal their login credentials. ESET...
Africa Cyber Surge II law enforcement operation has led to the arrest of 14 suspects – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini An international law enforcement operation across 25 African countries has led to the arrest of 14 cybercriminals. A coordinated law...
Bronze Starlight targets the Southeast Asian gambling sector – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Experts warn of an ongoing campaign attributed to China-linked Bronze Starlight that is targeting the Southeast Asian gambling sector. SentinelOne...
The Week in Ransomware – August 18th 2023 – LockBit on Thin Ice – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams While there was quite a bit of ransomware news this week, the highlighted story was the release of Jon DiMaggio’s...
WinRAR flaw lets hackers run programs when you open RAR archives – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A high-severity vulnerability has been fixed in WinRAR, the popular file archiver utility for Windows used by millions, that can...
Hotmail email delivery fails after Microsoft misconfigures DNS – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams Hotmail users worldwide have problems sending emails, with messages flagged as spam or not delivered after Microsoft misconfigured the domain’s...
Interpol arrests 14 suspected cybercriminals for stealing $40 million – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas An international law enforcement operation led by Interpol has led to the arrest of 14 suspected cybercriminals in an operation...
ExpressVPN Review (2023): Features, Pricing and Alternatives – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Franklin Okeke This is a comprehensive ExpressVPN Review, covering features, pricing, and more. Use this guide to find out if it is...
About 2000 Citrix NetScalers Were Compromised in Massive Attack Campaigns – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet on August 18, 2023, 3:26 PM EDT About 2000 Citrix NetScalers Were Compromised in Massive Attack Campaigns About 2,000 Citrix...
Top 5 Disaster Recovery as a Service Providers for 2023 – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Jonathan Kalibbala Unitrends Backup and Recovery: Best for AI-based backups and disaster prevention Microsoft Azure Site Recovery: Best for easy disaster recovery...
Five Things To Know About PCI DSS 4.0 Authentication Requirements – Source: securityboulevard.com
Source: securityboulevard.com – Author: Shelley Leveson, Director of Content Marketing, HYPR The Payment Card Industry Security Standards Council recently updated their Data Security Standard (PCI DSS)...
Securing the Cloud: Unveiling the Significance of Strong Identity and Access Management (IAM) Strategies – Source: securityboulevard.com
Source: securityboulevard.com – Author: Team Solvo In today’s rapidly evolving digital landscape, where businesses are increasingly migrating their operations to the cloud, the importance of robust...
BSidesTLV 2023 – Georgios Karantzas – It’s Duck Season: Forensic Detection Of BadUsb Attacks – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Security Boulevard The Home of the Security Bloggers Network Community Chats Webinars Library Home Cybersecurity News Features Industry Spotlight News...
Executive Threat Protection: Using Monitoring to Gain the Advantage – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka The risk of cyber threats has become an everyday reality for many organizations. This risk is amplified when it comes...
IBM Extends Cloudflare Alliance to Combat Bots Using Machine Learning – Source: securityboulevard.com
Source: securityboulevard.com – Author: Michael Vizard IBM has extended its alliance with Cloudflare to employ machine learning algorithms to combat malicious bot attacks that are growing...
Play Ransomware Targets Victims Via MSPs’ RMM Software – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt The Play ransomware operators who took credit for the attack on the city of Oakland, California, in February is now...
KubeCrash Fall 2023: Multi-Cluster Deployments at Enterprise Scale – Source: securityboulevard.com
Source: securityboulevard.com – Author: Danielle Cook With KubeCon approaching fast (yes, November will be here before we know it), we’ve been preparing for KubeCrash, your cloud...