French Hospital Halts Operations After Cyber-AttackAndré-Mignot hospital shuts down computer systemsLeer másAndré-Mignot hospital shuts down computer systems
Software projects face supply chain security risk due to insecure artifact downloads via GitHub Actions
Software projects face supply chain security risk due to insecure artifact downloads via GitHub ActionsThe way build artifacts are stored by the GitHub Actions platform could...
Spanish Authorities Bust €12M Investment Scam Operation
Spanish Authorities Bust €12M Investment Scam OperationThe Spanish National Police dissolved a cybercrime ring that defrauded 300 people out of almost €12.3 million via phony investment...
When blaming the user for a security breach is unfair – or just wrong
When blaming the user for a security breach is unfair – or just wrongIn his career in IT security leadership, Aaron de Montmorency has seen a...
Microsoft: Beware Russian Winter Cyber-Offensive
Microsoft: Beware Russian Winter Cyber-OffensiveUkraine's allies may be in the firing line for destructive attacksLeer másUkraine's allies may be in the firing line for destructive attacks
Researchers found security pitfalls in IBM’s cloud infrastructure
Researchers found security pitfalls in IBM’s cloud infrastructureSecurity researchers recently probed IBM Cloud’s database-as-a-service infrastructure and found several security issues that granted them access to the...
Digital Giant ABB to Pay $315m in Bribery Case
Digital Giant ABB to Pay $315m in Bribery CaseFirm pleads guilty in major South Africa conspiracyLeer másFirm pleads guilty in major South Africa conspiracy
API Vulnerabilities: What Are These and How to Protect your Business Against Them
API Vulnerabilities: What Are These and How to Protect your Business Against ThemApplication programming interfaces (APIs) are software intermediaries that allow different programs to communicate efficiently with...
Manufacturers Struggle to Manage Cyber-Threats from New Tech Deployments
Manufacturers Struggle to Manage Cyber-Threats from New Tech Deployments42% of UK manufacturers have been a victim of cybercrime in the past 12 months, according to new...
Google Releases Chrome Emergency Fix For Ninth Zero-Day This Year
Google Releases Chrome Emergency Fix For Ninth Zero-Day This YearThe flaw relates to a type confusion bug in the V8 JavaScript engineLeer másThe flaw relates to...
Cyber Extortion Growing Exponentially in Africa, Middle East and China, Finds Orange
Cyber Extortion Growing Exponentially in Africa, Middle East and China, Finds OrangeBusinesses are getting better at preventing cyber incidents, Orange Cybedefense’s head of Security Research Center...
What Is Digital Forensics and Incident Response (DFIR)?
What Is Digital Forensics and Incident Response (DFIR)?Digital Forensics and Incident Response (DFIR) is an aspect of cybersecurity focused on identifying, investigating, and fixing cyberattacks. Digital forensics...
‘Team Mysterious Bangladesh’ Hackers Target Indian Education Entity
'Team Mysterious Bangladesh' Hackers Target Indian Education EntityThe hackers allegedly stole PII, including names, Aadhar numbers and IFSC codesLeer másThe hackers allegedly stole PII, including names,...
Rackspace Restores Systems After Security Incident
Rackspace Restores Systems After Security IncidentThe known impact was isolated to a portion of the firm's Hosted Exchange platformLeer másThe known impact was isolated to a...
Data Breaches in Australia Will Now Result in Fines of Up to AU$50 Million
Data Breaches in Australia Will Now Result in Fines of Up to AU$50 MillionThe Australian Parliament approved Government’s privacy penalty bill: the maximum fine for companies...
A new Linux flaw can be chained with other two bugs to gain full root privileges
A new Linux flaw can be chained with other two bugs to gain full root privilegesQualys researchers demonstrated how to chain a new Linux flaw with...
Malicious Apps with Over 2 Million Installs Found on Google Play
Malicious Apps with Over 2 Million Installs Found on Google PlayMultiple apps pretending to be useful utilities and system optimizers, but hiding malware have been identified...
Google fixed the ninth actively exploited Chrome zeroday this year
Google fixed the ninth actively exploited Chrome zeroday this yearGoogle released security updates to address a new Chrome zero-day flaw, tracked as CVE-2022-4262, actively exploited in...
Lazarus Hacking Group Uses New Fake Crypto App to Spread Malware
Lazarus Hacking Group Uses New Fake Crypto App to Spread MalwareLazarus hacking group spreads malware using a fake cryptocurrency app called BloxHolder. This made-up brand pretends...
Security Affairs newsletter Round 396
Security Affairs newsletter Round 396A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in...
Critical Ping bug potentially allows remote hack of FreeBSD systems
Critical Ping bug potentially allows remote hack of FreeBSD systemsA critical stack-based buffer overflow bug, tracked as CVE-2022-23093, in the ping service can allow to take over FreeBSD...
Lazarus APT uses fake cryptocurrency apps to spread AppleJeus Malware
Lazarus APT uses fake cryptocurrency apps to spread AppleJeus MalwareThe North Korea-linked Lazarus APT spreads fake cryptocurrency apps under the fake brand BloxHolder to install the...
Law enforcement agencies can extract data from thousands of cars’ infotainment systems
Law enforcement agencies can extract data from thousands of cars’ infotainment systemsLaw enforcement agencies can extract data from the infotainment systems of thousands of different car...
US DHS Cyber Safety Board will review Lapsus$ gang’s operations
US DHS Cyber Safety Board will review Lapsus$ gang’s operationsUS DHS Cyber Safety Review Board will review attacks linked to the Lapsus$ extortion gang that hit...
New CryWiper wiper targets Russian entities masquerading as a ransomware
New CryWiper wiper targets Russian entities masquerading as a ransomwareExperts spotted a new data wiper, dubbed CryWiper, that was employed in destructive attacks against Russian mayor’s offices...
Phishing Attack Strikes Apple Users During Black Friday Sales
Phishing Attack Strikes Apple Users During Black Friday SalesApple users were the target of a phishing attack that used social engineering last month, during Black Friday,...
French hospital cancels operations after a ransomware attack
French hospital cancels operations after a ransomware attackA French hospital near Paris canceled operations and transfer some patients due to a cyber attack suffered over the...
Exclusive: The largest mobile malware marketplace identified by Resecurity in the Dark Web
Exclusive: The largest mobile malware marketplace identified by Resecurity in the Dark WebResecurity has identified a new underground marketplace in the Dark Web oriented towards mobile malware developers...
Weekly Update 324
Weekly Update 324We're in Copenhagen! Scott and family joined us in Oslo for round 2 of wedding celebrations this week before jumping on the ferry to...
Separation of Privilege (SoP) 101: Definition and Best Practices
Separation of Privilege (SoP) 101: Definition and Best PracticesA system’s security should be effective enough to protect against potential attacks. If the software is partitioned into...
