Source: www.databreachtoday.com – Author: 1 Thank you for registering with ISMG Complete your profile and stay up to date Need help registering? Contact Support Original Post...
Month: January 2024
LoanDepot Hit by Ransomware Attack; Multiple Systems Offline – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Incident & Breach Response , Security Operations Large Mortgage Lender’s Customers Say the Online Payment Portable Is Inaccessible Mathew J. Schwartz...
BreachForums Boss Jailed for Violating Release Requirements – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Cybercrime , Fraud Management & Cybercrime Conor Fitzgerald Allegedly Violated Computer Monitoring Requirement, VPN Ban Mathew J. Schwartz (euroinfosec) • January...
QNAP Patches High-Severity Flaws in QTS, Video Station, QuMagie, Netatalk Products – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire QNAP has released patches for a dozen vulnerabilities in its products, including several high-severity flaws. The post QNAP Patches High-Severity...
Turkish Cyberspies Targeting Netherlands – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Turkish state-sponsored group Sea Turtle has been targeting multiple organizations in the Netherlands for espionage. The post Turkish Cyberspies Targeting...
Major IT, Crypto Firms Exposed to Supply Chain Compromise via New Class of CI/CD Attack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Self-hosted GitHub Actions runners could allow attackers to inject malicious code into repositories, leading to supply chain attacks. The post...
NIST: No Silver Bullet Against Adversarial Machine Learning Attacks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs NIST has published guidance on adversarial machine learning (AML) attacks and mitigations, warning that there is no silver bullet. The...
How to Get Started With Security Automation: Consider the Top Use Cases Within Your Industry – Source: www.securityweek.com
Source: www.securityweek.com – Author: Marc Solomon Organizations in different industries may approach security automation from a different entry point, but the requirements for an automation platform...
CISO Conversations: Jason Rebholz and Jason Ozin From the Insurance Sector – Source: www.securityweek.com
Source: www.securityweek.com – Author: Kevin Townsend SecurityWeek interviews two CISOs from the insurance sector: Jason Rebholz at Corvus Insurance and Jason Ozin at UK-based PIB Group....
Lebanon Airport Screens Display Anti-Hezbollah Message After Being Hacked – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press The information display screens at Beirut’s international airport were hacked by domestic anti-Hezbollah groups. The post Lebanon Airport Screens Display...
Vulnerability Handling in 2023: 28,000 New CVEs, 84 New CNAs – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A total of more than 28,000 CVE IDs were assigned in 2023 and 84 new CVE Numbering Authorities (CNAs) were...
The latest cyber kidnapping victim, U.S. exchange student – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: In the U.S. state of Utah, police discovered a teenage Chinese exchange student alone in a freezing cold tent,...
New Research: Tackling .NET Malware With Harmony Library – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Security researchers have recently unveiled strategic insights into countering .NET malware through the innovative use of the Harmony library. The research,...
Anti-Hezbollah Groups Hack Beirut Airport Screens – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Beirut’s international airport faced a cyber-attack on Sunday, January 8, reportedly orchestrated by domestic anti-Hezbollah groups. The attack comes amid escalating tensions...
Turkish APT Sea Turtle Resurfaces, Spies on Dutch IT Firms – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Sea Turtle, a group of hackers aligned with the Turkish government, has returned after going undetected since 2020. Dutch cybersecurity provider,...
North Korean Hackers Stole $600m in Crypto in 2023 – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 North Korean hackers stole at least $600m in cryptocurrency in 2023, around a third of the total value of such heists,...
Merck Settles With Insurers Over $700m NotPetya Claim – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Merck has finally reached a settlement with its insurers after they had refused to pay out following the NotPetya campaign due...
Security Firm Certik’s Account Hijacked to Spread Crypto Drainer – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A Web3 security vendor was tricked by a social media phishing attack which hijacked its account and enabled scammers to share...
US, Israel Used Dutch Spy to Launch Stuxnet Malware Against Iran – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Editor, Dark Reading 1 Min Read Source: Mohammad Aaref Barahouei via Alamy Stock Photo After a two-year investigation into the...
Cacti Monitoring Tool Spiked by Critical SQL Injection Vulnerability – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Source: Nate Hovee via Shutterstock A critical vulnerability in the Cacti Web-based open source framework for monitoring network...
Turkish APT ‘Sea Turtle’ Resurfaces to Spy on Kurdish Opposition – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Source: Marius Graf via Alamy Stock Photo A group aligned with the interests of the government of Turkey...
‘Swatting’ Becomes Latest Extortion Tactic in Ransomware Attacks – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading 1 Min Read Source: Nipiphon Na Chiangmai via Alamy Stock Photo Using a tactic known as...
Beirut Airport Cyberattack Targets Hezbollah – Source: www.darkreading.com
Source: www.darkreading.com – Author: John Leyden Source: Leonid Andronov via Alamy Stock Photo Screen displays at the Rafic Hariri International Airport in Lebanon were defaced with...
Protecting Critical Infrastructure Means Getting Back to Basics – Source: www.darkreading.com
Source: www.darkreading.com – Author: David Lancaster Jr. Source: Andrii Yalanskyi via Alamy Stock Photo Critical infrastructure organizations are undergoing dramatic changes in their technology and cybersecurity...
Iranian Crypto Exchange Misstep Exposes User Details – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff Source: gabriel cassan via Alamy Stock Photo A misconfigured object storage system used by Iranian crypto exchange bit24.cash has...
Syrian Hackers Distributing Stealthy C#-Based Silver RAT to Cybercriminals – Source:thehackernews.com
Source: thehackernews.com – Author: . Jan 08, 2024NewsroomMalware / Cybercrime Threat actors operating under the name Anonymous Arabic have released a remote access trojan (RAT) called...
Swiss Air Force sensitive files stolen in the hack of Ultra Intelligence & Communications – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Swiss Air Force sensitive files stolen in the hack of Ultra Intelligence & Communications Documents belonging to the Swiss Air...
Saudi Ministry exposed sensitive data for 15 months – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Saudi Ministry exposed sensitive data for 15 months Saudi Ministry of Industry and Mineral Resources (MIM) had an environment file...
DoJ charged 19 individuals in a transnational cybercrime investigation xDedic Marketplace – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini DoJ charged 19 individuals in a transnational cybercrime investigation xDedic Marketplace 19 individuals worldwide were charged in a transnational cybercrime...
Long-existing Bandook RAT targets Windows machines – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Long-existing Bandook RAT targets Windows machines A new variant of the Bandook remote access trojan (RAT) was spotted in attacks...





















