Source: www.bleepingcomputer.com – Author: Bill Toulas A new iOS and Android trojan named ‘GoldPickaxe’ employs a social engineering scheme to trick victims into scanning their faces...
Author: CISO2CISO Editor 2
Rhysida ransomware cracked! Free decryption tool released – Source: www.tripwire.com
Source: www.tripwire.com – Author: Graham Cluley Good news for organisations who have fallen victim to the notorious Rhysida ransomware. A group of South Korean security researchers...
North Korea successfully hacks email of South Korean President’s aide, gains access to sensitive information – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley The office of South Korean president Yoon Suk Yeol has confirmed that it believes North Korea hacked into the emails...
Smashing Security podcast #359: Declaring war on ransomware gangs, mobile muddles, and AI religion – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Holy mackerel! AI is jumping on the religion bandwagon, ransomware gangs target hospitals, and what’s happened to your old mobile...
Russian APT Turla Wields Novel Backdoor Malware Against Polish NGOs – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Source: Science Photo Library via Alamy Stock Photo Russia-sponsored advanced persistent threat group (APT) Turla is now targeting...
Cybersecurity’s Transformative Shift – Source: www.darkreading.com
Source: www.darkreading.com – Author: Katie McCullough Source: Denis Putilov via Alamy Stock Photo COMMENTARY Cybersecurity, once a fortress built on rigid protocols and reactive measures, is...
AWS SNS Hijackings Fuel Cloud Smishing Campaign – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: Francis Vachon via Alamy Stock Photo Showcasing a previously unseen cyberattack technique, threat actors are...
10 Security Metrics Categories CISOs Should Present to the Board – Source: www.darkreading.com
Source: www.darkreading.com – Author: Ericka Chickowski, Contributing Writer Source: ConceptCafe via Alamy Stock Photo With the US Securities and Exchange Commission requiring CISOs and boards of...
CISO and CIO Convergence: Ready or Not, Here It Comes – Source: www.darkreading.com
Source: www.darkreading.com – Author: Arthur Lozinski Source: vska via Alamy Stock Photo COMMENTARY As IT-related business requirements change, the roles and responsibilities of IT leaders change...
CSC Partners With NetDiligence to Help Mitigate Cyber Risks – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE WILMINGTON, Del.–(BUSINESS WIRE)– CSC, an enterprise-class domain registrar and world leader in mitigating domain security, domain name system (DNS), and...
United Nations Digging Into DPRK Crypto Cyberattacks Totaling $3B – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff Source: Stuart Miles via Alamy Stock Photo The United Nations is poised to announce an investigation into North Korean...
US Govt. Offers Millions in Bounties to Find Hive Ransomware Actors – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff Source: imageBROKER via Alamy Stock Photo The US Department of State is offering $10 million for information that can...
Bugcrowd Secures $102M in Strategic Growth Funding to Scale AI-Powered Crowdsourced Security Platform – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE SAN FRANCISCO, February 12, 2024 – Bugcrowd has secured $102 million in strategic growth financing to scale its AI-powered crowdsourced security...
33M French Citizens Impacted in Country’s Largest-Ever Breach – Source: www.darkreading.com
Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading Source: John Kellerman via Alamy Stock Photo The French data protection agency, the CNIL, has...
Prudential Financial Faces Cybersecurity Breach – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Prudential Financial has disclosed a cybersecurity breach. Detected on February 5 2024, the breach involved unauthorized access to certain company systems. In...
Crypto-Money Laundering Records 30% Annual Decline – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Just over $22bn worth of cryptocurrency was laundered in 2023, a 30% drop from the previous year, with nefarious actors switching...
Microsoft, OpenAI Confirm Nation-States are Weaponizing Generative AI in Cyber-Attacks – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Nation-state threat actors are making use of generative AI tools, including large language models (LLMs) like ChatGPT, in their cyber operations,...
GoldPickaxe Trojan Blends Biometrics Theft and Deepfakes to Scam Banks – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Security researchers have warned of a sophisticated new Trojan designed to steal facial biometric data and use it to produce deepfakes of...
Water Hydra’s Zero-Day Attack Chain Targets Financial Traders – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The Trend Micro Zero Day Initiative (ZDI) has recently unearthed a critical vulnerability, identified as CVE-2024-21412, which they’ve dubbed ZDI-CAN-23100. The...
PII Input Sparks Cybersecurity Alarm in 55% of DLP Events – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A substantial 55% of recent Data Loss Prevention (DLP) events have involved attempts to input personally identifiable information (PII), while 40%...
Iranian Hackers Target Israel and US to Sway Public Opinion in Hamas Conflict – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Google’s Threat Analyst Group has confirmed that Iran-backed hackers have used their cyber capabilities to undercut public support for the Israel-Hamas conflict...
Cybersecurity Spending Expected to be Slashed in 41% of SMEs – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Cybersecurity spending is predicted to be cut by 41% of SMEs over the coming year amid the challenging economic environment, according...
Microsoft Fixes Two Zero-Days in February Patch Tuesday – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Microsoft has landed system administrators with a busy February after releasing updates for 73 vulnerabilities, including two zero-day flaws currently under...
Romantic AI Chatbots Fail the Security and Privacy Test – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Experts have warned users of AI-powered “relationship” chatbots that their data and privacy are at risk, after failing all 11 apps...
Southern Water Notifies Customers and Employees of Data Breach – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Southern Water has confirmed that personal data of both customers and employees has been accessed in a recent ransomware attack. The...
Bank of America Customers at Risk After Data Breach – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Bank of America has alerted its customers about a recent data breach that occurred through one of its service providers, Infosys...
CISA adds Microsoft Windows bugs to its Known Exploited Vulnerabilities catalog – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini CISA adds Microsoft Windows bugs to its Known Exploited Vulnerabilities catalog Pierluigi Paganini February 15, 2024 U.S. Cybersecurity and Infrastructure...
Nation-state actors are using AI services and LLMs for cyberattacks – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Nation-state actors are using AI services and LLMs for cyberattacks Pierluigi Paganini February 15, 2024 Microsoft and OpenAI warn that...
Abusing the Ubuntu ‘command-not-found’ utility to install malicious packages – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Abusing the Ubuntu ‘command-not-found’ utility to install malicious packages Pierluigi Paganini February 14, 2024 Researchers reported that attackers can exploit...
Zoom fixed critical flaw CVE-2024-24691 in Windows software – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Zoom fixed critical flaw CVE-2024-24691 in Windows software Pierluigi Paganini February 14, 2024 Zoom addressed seven vulnerabilities in its desktop...