Source: www.schneier.com – Author: Bruce Schneier About Bruce Schneier I am a public-interest technologist, working at the intersection of security, technology, and people. I’ve been writing...
Day: November 22, 2024
The Scale of Geoblocking by Nation – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Interesting analysis: We introduce and explore a little-known threat to digital equality and freedomwebsites geoblocking users in response to political...
BianLian Ransomware Detection: AA23-136A Joint Cybersecurity Advisory Details on TTPs Leveraged by BianLian Operators in the Ongoing Malicious Campaigns – Source: socprime.com
Source: socprime.com – Author: Daryna Olyniychuk Following a wave of cyber attacks by the Iran-linked hacking collective tracked as Pioneer Kitten, the FBI, CISA, and authoring...
Microsoft Seizes 240 Websites to Disrupt Global Distribution of Phish Kits – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Microsoft has seized 240 fraudulent websites associated with “do-it-yourself” phishing kits used by cybercriminals globally to break into customer accounts. The action...
Russian Cyber Spies Target Organizations with HatVibe and CherrySpy Malware – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A Russian-aligned hacking group is conducting a cyber espionage campaign across Europe and Asia, according to Recorded Future. Insikt Group, Recorded Future’s...
Three-Quarters of Black Friday Spam Emails Identified as Scams – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Written by Consumers have been warned that 77% of Black Friday-themed spam emails in 2024 have been identified as scams, with the...
Five Ransomware Groups Responsible for 40% of Cyber-Attacks in 2024 – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Five ransomware groups, including RansomHub and LockBit 3.0, accounted for 40% of all cyber-attacks in Q3 2024, highlighting the increasing complexity and...
MITRE Unveils Top 25 Most Critical Software Flaws – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Cross-site scripting has been identified as the most critical software flaw of the past year, according to a recent report from MITRE....
Manufacturing Sector in the Crosshairs of Advanced Email Attacks – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Written by Advanced email attacks, including phishing and business email compromise (BEC), are surging in the manufacturing sector as cybercriminals target an...
Wire cutters: how the world’s vital undersea data cables are being targeted – Source: www.theguardian.com
Source: www.theguardian.com – Author: Dan Milmo Global technology editor The lead-clad telegraphic cable seemed to weigh tons, according to Lt Cameron Winslow of the US navy,...
In Other News: Nvidia Fixes Critical Flaw, Chinese Linux Backdoor, New Details in WhatsApp-NSO Lawsuit – Source: www.securityweek.com
Source: www.securityweek.com – Author: SecurityWeek News SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide...
US Takes Down Stolen Credit Card Marketplace PopeyeTools – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The US Department of Justice this week announced the seizure of PopeyeTools, a marketplace for trading stolen credit card information,...
Russian Cyberespionage Group Hit 60 Victims in Asia, Europe – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A Russia-linked cyberespionage group has made over 60 victims in Asia and Europe, mainly in the government, human rights, and...
Rising Tides: Wendy Nather on Resilience, Leadership, and Building a Stronger Cybersecurity Community – Source: www.securityweek.com
Source: www.securityweek.com – Author: Jennifer Leggio When I ask around about who most consistently exemplifies strength and resilience in our industry, the answer is quite often...
400,000 Systems Potentially Exposed to 2023’s Most Exploited Flaws – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Hundreds of thousands of internet-accessible hosts are potentially exposed to exploits targeting the top routinely exploited vulnerabilities of 2023, VulnCheck...
Microsoft Disrupts ONNX Phishing Service, Names Its Operator – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Microsoft on Thursday announced significantly disrupting the ONNX phishing service and made public the name of an Egyptian man who...
Prompt Security Raises $18 Million for Gen-AI Security Platform – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Generative AI security startup Prompt Security on Wednesday announced raising $18 million in Series A funding, which brings the total...
Thai Court Dismisses Activist’s Suit Against Israeli Spyware Producer Over Lack of Evidence – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press A Thai court on Thursday threw out a lawsuit brought by a pro-democracy activist which alleged spyware produced by an...
British Lawmakers Leery of Losing EU Adequacy Status – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: General Data Protection Regulation (GDPR) , Standards, Regulations & Compliance Lawmakers Expressed Concerns Over Proposed Data Use and Access Bill Akshaya Asokan...
Wiz Fortifies Application Security With $450M Dazz Purchase – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: Application Security , Cloud Security , Next-Generation Technologies & Secure Development Buy of Application Security Startup Enhances Code-to-Cloud Vulnerability Management Michael Novinson...
GAO: HHS Needs to Be a Better Leader in Health Sector Cyber – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: Healthcare , Industry Specific , Standards, Regulations & Compliance Watchdog Agency Report Points to Unimplemented Cyber Recommendations Marianne Kolbasuk McGee (HealthInfoSec) •...
CISA Red Team Finds Alarming Critical Infrastructure Risks – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: Critical Infrastructure Security Red Team Finds Vulnerabilities in Critical Infrastructure Org’s Security Framework Chris Riotta (@chrisriotta) • November 21, 2024 ...
Will Arrests Squash Scattered Spider’s Cybercrime Assault? – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: Cybercrime , Fraud Management & Cybercrime , Ransomware Members of Loosely Organized Group Recently Tied to Partnership With RansomHub Mathew J. Schwartz...
Mafia-Beratungsstelle befürchtet Datenleck – Source: www.csoonline.com
Source: www.csoonline.com – Author: News 22 November 20242 Minuten CyberangriffeCyberkriminalität Für Betroffene besteht potenziell Lebensgefahr. Mit der Mafia ist auch in Japan nicht zu spaßen. Makhh...
17 hottest IT security certs for higher pay today – Source: www.csoonline.com
Source: www.csoonline.com – Author: With the New Year on the horizon, many IT professionals may be looking to improve their careers in 2025 but need direction...
Was ist ein Botnet? – Source: www.csoonline.com
Source: www.csoonline.com – Author: Ein Botnet ermöglicht Cyberkriminellen unter anderem, Malware in großem Stil zu verbreiten und DDoS-Attacken zu initiieren. Ein Botnetz besteht aus vielen “Zombie”-Rechnern...
FBI pierces ‘anonymity’ of cryptocurrency, secret domain registrars in Scattered Spider probe – Source: www.csoonline.com
Source: www.csoonline.com – Author: News 21 Nov 20247 mins CybercrimePhishingSecurity When the US Justice Department unsealed documents on Wednesday revealing the arrests of key Scattered Spider...
Rising ClickFix malware distribution trick puts PowerShell IT policies on notice – Source: www.csoonline.com
Source: www.csoonline.com – Author: News Analysis 21 Nov 20246 mins Application SecurityMalwarePhishing IT teams should revisit PowerShell restrictions as an increasingly used click-and-fix technique has users...
Finastra bestätigt Datendiebstahl – Source: www.csoonline.com
Source: www.csoonline.com – Author: Der Finanztech-Anbieter Finastra hat eingeräumt, dass Kundendaten gestohlen wurden. LCV -Shutterstock.com Wie Security-Experte Brian Krebs auf seiner Website berichtet, hat ein Cyberkrimineller...
Cross-Site Scripting Is 2024’s Most Dangerous Software Weakness – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Senior Editor, Dark Reading Source: Sergey Tarasov via Alamy Stock Photo Although a new methodology shook up the rankings of...