Source: www.databreachtoday.com – Author: 1 Digital Identity , Identity & Access Management , Security Operations Insights from recent cyberattacks where weak authentication measures were circumvented March...
Month: March 2024
Breach Roundup: Russian Organizations Losing Microsoft Cloud – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Cybercrime , Fraud Management & Cybercrime , Incident & Breach Response Also: Hackers Target Apple Password Reset Flaw Anviksha More (AnvikshaMore)...
Sellafield nuclear waste dump faces prosecution over cybersecurity failures – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley The UK’s Office for Nuclear Regulation (ONR) has started legal action against the controversial Sellafield nuclear waste facility due to...
Smashing Security podcast #365: Hacking hotels, Google’s AI goof, and cyberflashing – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Security researchers find a way to unlock millions of hotel rooms, the UK introduces cyberflashing laws, and Google’s AI search...
Ransomware hits The Big Issue. Qilin group leaks confidential data – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley The Qilin ransomware group has targeted The Big Issue, a street newspaper sold by the homeless and vulnerable. As The...
Trezor’s Twitter account hijacked by cryptocurrency scammers via bogus Calendly invite – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley This isn’t the kind of thing you expect to see posted on the official Twitter account of Trezor, the well-known...
Ransomware: lessons all companies can learn from the British Library attack – Source: www.exponential-e.com
Source: www.exponential-e.com – Author: Graham Cluley In October 2023, the British Library suffered “one of the worst cyber incidents in British history,” as described by Ciaran...
Proofpoint’s Inaugural Data Loss Landscape Report Reveals Careless Employees are Organizations’ Biggest Data Loss Problem – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: 1 85% of organizations experienced data loss in the past year; 90% of those saw negative outcomes including revenue losses and reputational...
Protecting Against Attacks on NTLM Authentication – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: 1 When it comes to cyberattacks, March has come in like a lion for Microsoft. Last week, Microsoft said in an SEC...
Proofpoint Honored with Comparably Best Places to Work Awards in Multiple Categories – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: 1 Employee ratings highlight Proofpoint’s positive company outlook and exemplary functional departments SUNNYVALE, Calif., March 14, 2024 – Proofpoint, Inc., a leading...
New BEC attacks involve US agency spoofing – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: 1 Email security, Network Security SC StaffMarch 7, 2024 Several U.S. government agencies, including the Department of Agriculture, Department of Transportation, and...
BEC, Credential Theft Attacks Spoof U.S. Government Agencies – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: 1 A threat actor has been targeting U.S. organizations with tens of thousands of emails purporting to be from U.S. government entities...
Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: 1 Mar 05, 2024NewsroomEmail Security / Network Security The threat actor known as TA577 has been observed using ZIP archive attachments in...
Research Saturday Podcast: The return of a malware menace. – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: 1 This week we are joined by, Selena Larson from Proofpoint, who is discussing their research, “Bumblebee Buzzes Back in Black.” Bumblebee...
Cyber defenses ramp up as hacks exploit gaps – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: 1 Organizations continue to race against cybercriminals to keep their systems secure by focusing on defensive measures, including addressing supply chain weaknesses,...
Thread Hijacking: Phishes That Prey on Your Curiosity – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs Thread hijacking attacks. They happen when someone you know has their email account compromised, and you are suddenly dropped into an...
Recent ‘MFA Bombing’ Attacks Targeting Apple Users – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs Several Apple customers recently reported being targeted in elaborate phishing attacks that involve what appears to be a bug in Apple’s...
Mozilla Drops Onerep After CEO Admits to Running People-Search Networks – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs The nonprofit organization that supports the Firefox web browser said today it is winding down its new partnership with Onerep, an...
The Not-so-True People-Search Network from China – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs It’s not unusual for the data brokers behind people-search websites to use pseudonyms in their day-to-day lives (you would, too). Some...
DinodasRAT Linux implant targeting entities worldwide – Source: securelist.com
Source: securelist.com – Author: Anderson Leite, Lisandro Ubiedo DinodasRAT, also known as XDealer, is a multi-platform backdoor written in C++ that offers a range of capabilities....
Android malware, Android malware and more Android malware – Source: securelist.com
Source: securelist.com – Author: GReAT Introduction Malware for mobile devices is something we come across very often. In 2023, our technologies blocked 33.8 million malware, adware,...
Threat landscape for industrial automation systems. H2 2023 – Source: securelist.com
Source: securelist.com – Author: Kaspersky ICS CERT Industrial threats Industrial threats 19 Mar 2024 minute read Global statistics across all threats In the second half of...
A patched Windows attack surface is still exploitable – Source: securelist.com
Source: securelist.com – Author: Elsayed Elrefaei, Ashraf Refaat, Kaspersky GERT On August 8, 2023, Microsoft finally released a kernel patch for a class of vulnerabilities affecting Microsoft...
What’s in your notepad? Infected text editors target Chinese users – Source: securelist.com
Source: securelist.com – Author: Sergey Puzan “Malvertising” is a popular way of attracting victims to malicious sites: an advertisement block is placed at the top of...
The State of Stalkerware in 2023–2024 – Source: securelist.com
Source: securelist.com – Author: Kaspersky The State of Stalkerware in 2023 (PDF) The annual Kaspersky State of Stalkerware report aims to contribute to awareness and a...
Top 10 web application vulnerabilities in 2021–2023 – Source: securelist.com
Source: securelist.com – Author: Oxana Andreeva, Kaspersky Security Services To help companies with navigating the world of web application vulnerabilities and securing their own web applications,...
Spam and phishing in 2023 – Source: securelist.com
Source: securelist.com – Author: Tatyana Kulikova, Olga Svistunova, Andrey Kovtun, Irina Shimko, Roman Dedenok The year in figures 45.60% of all email sent worldwide and 46.59%...
Network tunneling with… QEMU? – Source: securelist.com
Source: securelist.com – Author: Grigory Sablin, Alexander Rodchenko, Kirill Magaskin Cyberattackers tend to give preference to legitimate tools when taking various attack steps, as these help...
An educational robot security research – Source: securelist.com
Source: securelist.com – Author: Nikolay Frolov In the modern world, we are surrounded by a multitude of smart devices that simplify our daily lives: smart speakers,...
Decade-old Linux ‘wall’ bug helps make fake SUDO prompts, steal passwords – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A vulnerability in the wall command of the util-linux package that is part of the Linux operating system could allow an unprivileged...




























