Source: www.infosecurity-magazine.com – Author: Ransomware claims reached an all-time high in November 2024, with Corvus Insurance reporting 632 victims claimed on ransomware groups’ data leak sites...
Author: CISO2CISO Editor 2
Researchers Discover Malware Used by Nation-Sates to Attack Industrial Systems – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Written by Researchers at industrial cybersecurity provider Claroty have discovered a new tool nation-state cyber threat actors use to attack civilian critical...
ISC2 Survey Reveals Critical Gaps in Cybersecurity Leadership Skills – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Leadership training and skills are severely lacking in the cybersecurity industry, according to ISC2’s Cybersecurity Leadership Survey. The accreditation and training body...
UK Shoppers Frustrated as Bots Snap Up Popular Christmas Gifts – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Almost three quarters of UK consumers (71%) believe malicious bots are ruining Christmas by snapping up all the most wanted presents, according...
Critical Vulnerabilities Found in Ruijie Reyee Cloud Management Platform – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Vulnerabilities in the Reyee cloud management platform and Reyee OS network appliances could allow threat actors to take over tens...
US Updates a Science and Technology Pact With China to Reflect Growing Rivalry and Security Threats – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press The U.S. has updated a decades-old science and technology agreement with China to reflect their growing rivalry for technological dominance....
In Other News: Gen Digital Makes $1B Buy, Recall Captures Sensitive Data, MITRE ATT&CK Evaluations – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide...
Hackers Possibly Stole Personal Data From Bitcoin ATM Operator Byte Federal – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Bitcoin ATM operator Byte Federal is notifying 58,000 people that their personal information might have been compromised in a data...
Rydox Cybercrime Marketplace Disrupted, Administrators Arrested – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The US on Thursday announced it has taken down Rydox, an illicit marketplace for stolen personal information and fraud tools,...
Microsoft Patches Vulnerabilities in Windows Defender, Update Catalog – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Microsoft on Thursday informed customers that two potentially critical vulnerabilities have been patched in Update Catalog and Windows Defender. The...
Germany Sinkholes Botnet of 30,000 BadBox-Infected Devices – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire At least 30,000 media devices were sold in Germany with pre-installed malware that ensnared them into a botnet, Germany’s Federal...
Iranian Hackers Use IOCONTROL Malware to Target OT, IoT Devices in US, Israel – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A notorious Iranian state-sponsored hacking group has been using custom-built malware to target IoT and operational technology (OT) devices in...
PUMA creeps through Linux with a stealthy rootkit attack – Source: www.csoonline.com
Source: www.csoonline.com – Author: The multi-stage rootkit targets Linux systems, using advanced stealth techniques to escalate privileges and avoid detection. A new loadable kernel module (LKM)...
How to turn around a toxic cybersecurity culture – Source: www.csoonline.com
Source: www.csoonline.com – Author: A poor security culture leaves team members confused, angry, and searching for solutions (or the door), while exposing critical systems to attack....
10 wichtige Security-Eigenschaften: So setzen Sie die Kraft Ihres IT-Sicherheitstechnik-Teams frei – Source: www.csoonline.com
Source: www.csoonline.com – Author: Da Security-Engineering-Teams immer mehr an Bedeutung gewinnen, müssen CISOs ihre Struktur und Entwicklung daran anpassen. Das sind die wichtigsten Aspekte. Lesen Sie,...
Security researchers find deep flaws in CVSS vulnerability scoring system – Source: www.csoonline.com
Source: www.csoonline.com – Author: News 12 Dec 20243 mins Advanced Persistent ThreatsBlack HatThreat and Vulnerability Management Cybersecurity experts from financial giant JPMorganChase say the cybersecurity community...
Europol shutters 27 DDoS sites in major crackdown – Source: www.csoonline.com
Source: www.csoonline.com – Author: New attacks were planned for the Christmas holiday. Europol has announced that it has carried out a major crackdown on cybercriminal actors in cooperation...
Microsoft Windows ‘Best Fit’ character conversion ‘ripe for exploitation’ – Source: www.csoonline.com
Source: www.csoonline.com – Author: Security researchers warn that the Windows ANSI API contains a hidden trap that could lead to arbitrary code execution — a new...
KeyTrap DNSSEC: The day the internet (almost) stood still – Source: www.csoonline.com
Source: www.csoonline.com – Author: Black Hat conference attendees heard a post-mortem on the KeyTrap DNSSEC vulnerability, which could have widely impacted browsing, email, TLS, and other...
Crypto Roundup: Crypto Pros Targeted With Fake Meeting Apps – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Blockchain & Cryptocurrency , Cryptocurrency Fraud , Fraud Management & Cybercrime Also: Australia Fines Kraken AU$8 Million Over Breaches Prajeet Nair (@prajeetspeaks)...
Russia Used Borrowed Spyware to Target Ukrainian Troops – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Government Secret Blizzard Used Third-Party Amadey Bots to Hack Ukrainian Military Devices...
US Indicts 14 North Koreans in IT Scam Funding WMD Programs – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Cybercrime , Fraud Management & Cybercrime , Governance & Risk Management DOJ Indicts North Korean IT Workers for Using Remote Jobs to...
New Malware Framework Targets Cleo File Systems – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Attack Surface Management , Cybercrime , Fraud Management & Cybercrime Possible Long-Term Attack by Unknown Hackers Thwarted Prajeet Nair (@prajeetspeaks) , David...
Unlocking Compliance: The Role of SBOMs in Modern Software Development – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: Presented by DigiCert 60 Minutes As software supply chain attacks grow more sophisticated, governments and industries are enforcing...
‘Dubai Police’ Lures Anchor Wave of UAE Mobile Attacks – Source: www.darkreading.com
Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading Source: Rastislav Sedlak via Alamy Stock Photo The Dubai Police are the latest victims of...
336K Prometheus Instances Exposed to DoS, ‘Repojacking’ – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Statue of PrometheusSource: luminous via Alamy Stock Photo Reseachers have discovered hundreds of thousands of servers running Prometheus...
Chinese Cops Caught Using Android Spyware to Track Mobile Devices – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Senior Editor, Dark Reading Source: Vicky Barlow via Alamy Stock Photo NEWS BRIEF A surveillance tool named EagleMeSpy, developed by...
IoT Cloud Cracked by ‘Open Sesame’ Over-the-Air Attack – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Senior Editor, Dark Reading Source: Hilke Maunder via Alamy Stock Photo Internet of Things (IoT) vendor Ruijie Networks has shored...
Europol Cracks Down on Holiday DDoS Attacks – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: M4OS Photos via Alamy Stock Photo NEWS BRIEF Law enforcement agencies around the world have...
Efforts to Secure US Telcos Beset by Salt Typhoon Might Fall Flat – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer In the wake of a widespread telecommunications breach at the hands of China, a US senator is proposing...

















