While an increasingly number of regulations have made the reporting of data breaches mandatory, a majority of IT professionals in the United States say they have...
Author: admin
Legion Malware Marches onto Web Servers to Steal Credentials, Spam Mobile Users
Threat actors are selling a novel credential harvester and hacktool via a Telegram channel, which can exploit numerous Web-based services to steal credentials. It also has...
Lazarus Group’s ‘DeathNote’ Cluster Pivots to Defense Sector
An operation within North Korea’s notorious Lazarus Group that initially focused solely on coin-mining attacks has begun targeting defense sector organizations around the world. The DeathNote...
FBI & FCC Warn on ‘Juice Jacking’ at Public Chargers, but What’s the Risk?
US government agencies are warning that malware planted in public charging stations for phones and other electronics can sneak onto your device when you least expect...
Data on 400K Kodi Forum Members Stolen and Put Up for Sale
The Kodi forum (MyBB) is a place where about 400,000 users of the Kodi open source media player come together to share tips on customizing their...
Microsoft: NSO Group-Like ‘QuaDream’ Actor Selling Mobile Spyware to Governments
Microsoft has identified another Israel-based threat organization, similar to NSO Group, that is selling mobile spyware and other cyber espionage tools and services to international governments...
LastPass Breach Reveals Important Lessons
The LastPass breach will be remembered as paradigmatic. The blast radius from this August 2022 breach grew from bad to catastrophic during a six-month period. Initially,...
1M+ WordPress Sites Hacked via Zero-Day Plug-in Bugs
At least 1 million websites that run on WordPress have been infected by a campaign that uses rafts of WordPress plug-in and theme vulnerabilities to inject...
Rethinking Cybersecurity’s Structure & the Role of the Modern CISO
Effective cybersecurity operations are as unique as the business models and technology choices of the companies they protect. Their creation and management are constantly complicated by...
Top Tech Talent Warns of AI’s Threat to Human Existence in Open Letter
More than 1,000 of technology’s top talent names — including Twitter CEO Elon Musk, Apple co-founder Steve Wozniak, and politician Andrew Yang — have signed an...
Microsoft Patches 97 CVEs, Including Zero-Day & Wormable Bugs
Microsoft’s Patch Tuesday security update for April 2023 contains patches for 97 CVEs, including one zero-day bug under active exploit in ransomware attacks, another that’s a reissue of...
Microsoft Azure Shared Key Misconfiguration Could Lead to RCE
Abuse of shared key authorizations, a default on Azure storage accounts, could allow a threat actor to steal higher privileged access tokens, move laterally throughout the...
‘Blatantly Obvious’: Spyware Offered to Cyberattackers via PyPI Python Repository
Researchers have discovered malware peddlers advertising an info-stealer out in the open on the Python Package Index (PyPI) — the official, public repository for the Python...
7 Things Your Ransomware Response Playbook Is Likely Missing
Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe Views:...
Attackers Hide RedLine Stealer Behind ChatGPT, Google Bard Facebook Ads
Cybercriminals are posting what appear to be legitimate sponsored ads on hijacked Facebook business and community pages, which promise free downloads of AI chatbots such as ChatGPT...
Israeli Irrigation Water Controllers & Postal Service Breached
On April 5, the Israel Post fell victim to a cyberattack, forcing the mail service to shut down some services. Just two days later, farmers missed...
Samsung Engineers Feed Sensitive Data to ChatGPT, Sparking Workplace AI Warnings
Recent reports about engineers at Samsung Electronics inadvertently leaking sensitive company information via ChatGPT in three separate incidents highlight why policies governing employee use of AI...
Apps for Sale: Cybercriminals Sell Android Hacks for Up to $20K a Pop
Cybercriminals are finding ways around the official Google Play app store’s security, developing tools for trojanizing existing Android applications and selling their malicious wares for up...
Pair of Apple Zero-Days Under Active Exploit; Patch & Update Accordingly
On April 7, Apple released two security updates warning about two zero-day vulnerabilities under active exploit in the wild. By April 10, those were added to the...
High-Stakes Ransomware Response: Know What Cards You Hold
When it comes to the ransomware game, it’s worth comparing it to another high-stakes activity, poker. It’s important for organizations to understand what they’re gambling with when they decide...
Russia’s Joker DPR Claims Access to Ukraine Troop Movement Data
The Joker DPR threat group has been around and functioning as an arm of the Russian state since 2019, largely focused on spreading disinformation and leaking sensitive...
Top Tech Talent Warns of AI’s Threat to Human Existence in Open Letter
More than 1,000 of technology’s top talent names — including Twitter CEO Elon Musk, Apple co-founder Steve Wozniak, and politician Andrew Yang — have signed an...
Spera Takes Aim at Identity Security Posture Management
Identity security startup Spera came out of stealth with $10 million in seed funding and a platform to protect enterprises from identity-driven threats. Spera is carving...
Top Tech Talent Warns of AI’s Threat to Human Existence in Open Letter
More than 1,000 of technology’s top talent names — including Twitter CEO Elon Musk, Apple co-founder Steve Wozniak, and politician Andrew Yang — have signed an...
US Space Force Requests $700M for Cybersecurity Blast Off
US Space Force top brass have requested a $700 million investment in cybersecurity as part of the military branch’s overall $30 billion 2024 budget. The Russian...
Post-Quantum Satellite Protection Rockets Towards Reality
Developers of post-quantum cryptography have successfully created a trial, data-transmission channel from Earth to satellites in multiple orbits that would be resistant to the hacking of...
Automatic Updates Deliver Malicious 3CX ‘Upgrades’ to Enterprises
Security researchers are sounding the alarm on what may well be another major SolarWinds or Kaseya-like supply chain attack, this time involving Windows and Mac versions...
BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist
Some cybercriminals are flipping their playbook on business email compromise (BEC) scams and, rather than posing as vendors seeking payment, are now posing as buyers, taking...
Microsoft Patches ‘Dangerous’ RCE Flaw in Azure Cloud Service
Microsoft has patched what researchers called a “dangerous” flaw in its Azure Service Fabric component of the company’s cloud-hosting infrastructure. If exploited, it would have allowed an...
Organizations Consider Self-Insurance to Manage Risk
As the market for cybersecurity insurance evolves and matures, insurance giant Lloyd’s of London is preparing to exclude most nation-state attacks from its coverage policies. In...


























