Category: EN

#StopRansomware: Play Ransomware

SUMMARY Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and…

FBI, CISA, and ASD’s ACSC Release Advisory on Play Ransomware

Today, the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) released a joint Cybersecurity Advisory (CSA), #StopRansomware: Play Ransomware, to disseminate Play ransomware group’s tactics, techniques,…

Mr. Cooper hackers stole personal data on 14 million customers

Hackers stole the sensitive personal information of more than 14.6 million Mr. Cooper customers, the mortgage and loan giant has confirmed. In a filing with Maine’s attorney general’s office, Mr. Cooper said the hackers stole customer names, addresses, dates of…

EFF Joins Forces with 20+ Organizations in the Coalition #MigrarSinVigilancia

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Today, EFF joins more than 25 civil society organizations to launch the Coalition #MigrarSinVigilancia (“To Migrate Without Surveillance”). The Latin American coalition’s aim is to oppose arbitrary…

CISA Flags Gaps in Healthcare Org’s Security Posture, Issues Security Guidance

The US cybersecurity agency CISA issues cybersecurity recommendations for the healthcare and public health sector. The post CISA Flags Gaps in Healthcare Org’s Security Posture, Issues Security Guidance appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…

NKAbuse Malware Utilizes NKN Blockchain Technology for Executing DDoS Attacks

  A newly identified multi-platform threat named NKAbuse has surfaced, employing a decentralized peer-to-peer network connectivity protocol known as NKN (New Kind of Network) for communication. Russian cybersecurity firm Kaspersky detailed the malware’s capabilities in a report, describing it as…

EU Targets Musk’s X Over Misinformation In First DSA Probe

EU launches formal investigation into X, formerly Twitter, over alleged levels of misinformation on platform in first probe under DSA This article has been indexed from Silicon UK Read the original article: EU Targets Musk’s X Over Misinformation In First…

The Art of Securing Cloud-Native Mobile Applications

This is an article from DZone’s 2023 Enterprise Security Trend Report. For more: Read the Report In the ever-evolving landscape of mobile applications, the seamless integration of cloud-native technologies has become a cornerstone for innovation, speed, and efficiency. As organizations…

Akamai discloses zero-click exploit for Microsoft Outlook

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Akamai discloses zero-click exploit for Microsoft Outlook

A Top Secret Chinese Spy Satellite Just Launched On A Supersized Rocket

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from News ≈ Packet Storm Read the original article: A Top Secret Chinese Spy Satellite Just Launched On…

How Microsoft’s Cybercrime Unit Has Evolved To Combat More Threats

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from News ≈ Packet Storm Read the original article: How Microsoft’s Cybercrime Unit Has Evolved To Combat More…

Stellar Cyber partners with BlackBerry to help users detect and respond to cyber threats

Stellar Cyber announced a new partnership with BlackBerry to deliver a comprehensive threat detection and response solution enabling MSSPs and enterprises to simplify their security stacks, increase productivity, and reduce the time it takes to detect and respond to cyber…

Rhadamanthys Malware: Swiss Army Knife of Information Stealers Emerges

The developers of the information stealer malware known as Rhadamanthys are actively iterating on its features, broadening its information-gathering capabilities and also incorporating a plugin system to make it more customizable. This approach not only transforms it into a threat capable of…

Qakbot is back and targets the Hospitality industry

Experts warn of a new phishing campaign distributing the QakBot malware, months after law enforcement dismantled its infrastructure. In August, the FBI announced that the Qakbot botnet was dismantled as a result of an international law enforcement operation named Operation ‘Duck Hunt.’ Qakbot, also known as…

Salvador Technologies Raises $6 Million for ICS/OT Attack Recovery Solution

Salvador Technologies has raised $6 million for its operational continuity and cyberattack recovery platform for ICS and OT. The post Salvador Technologies Raises $6 Million for ICS/OT Attack Recovery Solution  appeared first on SecurityWeek. This article has been indexed from…

SMTP Smuggling Allows Spoofed Emails to Bypass Authentication Protocols

A new attack technique named SMTP Smuggling can allow malicious actors to send out spoofed emails that bypass authentication mechanisms. The post SMTP Smuggling Allows Spoofed Emails to Bypass Authentication Protocols appeared first on SecurityWeek. This article has been indexed…

NSA Issues Guidance on Incorporating SBOMs to Improve Cybersecurity

NSA has published guidance to help organizations incorporate SBOM to mitigate supply chain risks. The post NSA Issues Guidance on Incorporating SBOMs to Improve Cybersecurity appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the…

Creating a New Market for Post-Quantum Cryptography

Quantum computing has the potential to disrupt the cybersecurity market and will spark the single largest IT systems upgrade in history. The post Creating a New Market for Post-Quantum Cryptography appeared first on Security Boulevard. This article has been indexed…

71% of Organizations Have Fallen Victim to Ransomware, Should Your Organization Be Concerned?

In an era where digital threats loom large, a startling 71% of organizations have found themselves besieged by ransomware, with the financial fallout averaging a hefty $4.35 million per breach. This isn’t just a sporadic skirmish in cyberspace; it’s an…

MongoDB investigating security incident that exposed data about customer accounts

Database management giant MongoDB says it’s investigating a security incident that has resulted in the exposure of some information about customers. The New York-based MongoDB helps more than 46,000 companies, including Adobe, eBay, Verizon, and the U.K.’s Department for Work…

Defending Against AI-Based Cyber Attacks: A Comprehensive Guide

As attackers begin to use AI to improve their tactics, defenders are forced to develop effective measures to protect their data. The post Defending Against AI-Based Cyber Attacks: A Comprehensive Guide appeared first on Scytale. The post Defending Against AI-Based…

Deception Tech: The Art of Cyber Counterintelligence

Deception technology is one of the most effective cybersecurity technologies available today. Here’s how to use it. The post Deception Tech: The Art of Cyber Counterintelligence appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

Data Insecurity: Experts Sound the Alarm on 4 Apps Putting User Privacy at Risk

  Security in the digital world continues to become more and more important with every passing year. Even though many of us rely on apps to entertain us, guide us, manage our exercise, and connect with family and friends, they…

China’s MIIT Proposes Color-coded Contingency Plan for Security Incidents

On Friday, China proposed a four-tier classification system, in an effort to address data security incidents, underscoring concerns of Beijing in regards to the widespread data leaks and hacking incidents in the country.  This emergency plan comes when the country…

Cyber Security Today, Dec. 18, 2023 – Customer contact info stolen from MongoDB, more stringent American cyber attack reporting rules start today

This episode reports on the new SEC cyber attack rules that come into effect today, guidance from the NSA on creating a software bill of rights This article has been indexed from IT World Canada Read the original article: Cyber…

Microsoft is working on a more secure print system for Windows

After announcing a gradual elimination of third-party printer drivers on Windows earlier this year, Microsoft has now unveiled its plan for enhancing security by introducting Windows Protected Print Mode (WPP). The problem with the current Windows print system For years,…

As the SEC’s new data breach disclosure rules take effect, here’s what you need to know

Starting from today, December 18, publicly-owned companies operating in the U.S. must comply with a new set of rules requiring them to disclose “material” cyber incidents within 96 hours. The regulation represents a significant shake-up for organizations, many of which…

How To Protect A New Technology Purchase | Avast

The holiday season often brings the excitement of receiving or gifting the latest tech gadgets, from smartphones to laptops and internet-connected devices. The thrill of starting with a brand-new device, free from smudges and clutter, is unmatched.   This article has…

Securing AI: Navigating the Complex Landscape of Models, Fine-Tuning, and RAG

Bad actors leverage AI, escalating the complexity and scale of threats. We need robust security measures and proper monitoring in developing, fine-tuning, and deploying AI models. This article has been indexed from Cisco Blogs Read the original article: Securing AI:…

National Grid latest UK org to zap Chinese kit from critical infrastructure

Move reportedly made after consulting with National Cyber Security Centre The National Grid is reportedly the latest organization in the UK to begin pulling China-manufactured equipment from its network over cybersecurity fears.… This article has been indexed from The Register…

Delta Dental of California Discloses Data Breach Impacting 6.9 Million People

Delta Dental of California says over 6.9 million individuals were impacted by a data breach caused by the MOVEit hack. The post Delta Dental of California Discloses Data Breach Impacting 6.9 Million People appeared first on SecurityWeek. This article has…

Cyber Security Today, Dec. 18, 2023 – Customer contact info stolen from MongoDB, more stringent American cyber attack reporting rules start today, and more

This episode reports on the new SEC cyber attack rules that come into effect today, guidance from the NSA on creating a software bill of rights This article has been indexed from IT World Canada Read the original article: Cyber…

Qakbot returns in fresh assault on hospitality sector

The Qakbot botnet has been disrupted this summer, but cybercriminals are not ready to give up on the malware: Microsoft’s threat analysts have spotted a new phishing campaign attempting to deliver it to targets in the hospitality industry. Qakbot and…

Four U.S. Nationals Charged in $80 Million Pig Butchering Crypto Scam

Four U.S. nationals have been charged for participating in an illicit scheme that earned them more than $80 million via cryptocurrency investment scams. The defendants – Lu Zhang, 36, of Alhambra, California; Justin Walker, 31, of Cypress, California; Joseph Wong,…

Scammers Are Tricking Anti-Vaxxers Into Buying Bogus Medical Documents

On Telegram, scammers are impersonating doctors to sell fake Covid-19 vaccination certificates and other products, showing how criminals are taking advantage of conspiracy theories. This article has been indexed from Security Latest Read the original article: Scammers Are Tricking Anti-Vaxxers…

ALPHV Second Most Prominent Ransomware Strain Before Reported Downtime

The group was second behind only LockBit in attacks targeting North America and Europe between January 2022 and October 2023 This article has been indexed from www.infosecurity-magazine.com Read the original article: ALPHV Second Most Prominent Ransomware Strain Before Reported Downtime

Protecting the perimeter with VT Intelligence – malicious URLs

Please note that this blogpost is part of our #VTMondays series, check out our collection of past publications here. One of the main attacking vectors attackers use for credential theft and malware deployment are malicious link-based attacks leveraging impersonated websites…

SEC Shares Important Clarifications as New Cyber Incident Disclosure Rules Come Into Effect

The SEC has provided some important clarifications on its new cyber incident disclosure requirements, which come into effect on December 18. The post SEC Shares Important Clarifications as New Cyber Incident Disclosure Rules Come Into Effect appeared first on SecurityWeek.…

Strobes 2023 Pentesting Recap: Trends, Stats, and How PTaaS is Transforming Cybersecurity

Like every year, we are releasing some research and analysis around our pen-testing in 2023. This article covers some amazing statistics on what category of vulnerabilities we commonly report across… The post Strobes 2023 Pentesting Recap: Trends, Stats, and How…

QakBot Malware Resurfaces with New Tactics, Targeting the Hospitality Industry

A new wave of phishing messages distributing the QakBot malware has been observed, more than three months after a law enforcement effort saw its infrastructure dismantled by infiltrating its command-and-control (C2) network. Microsoft, which made the discovery, described it as a low-volume…

Unmasking the Dark Side of Low-Code/No-Code Applications

Low-code/no-code (LCNC) and robotic process automation (RPA) have gained immense popularity, but how secure are they? Is your security team paying enough attention in an era of rapid digital transformation, where business users are empowered to create applications swiftly using…

3CX Urges Customers to Disable Integration Due to Potential Vulnerability

3CX tells customers to temporarily disable SQL Database integration to mitigate a potential vulnerability. The post 3CX Urges Customers to Disable Integration Due to Potential Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…

MongoDB corporate systems breached, customer data exposed

Database management company MongoDB has suffered a breach: attackers have gained access to some of its corporate systems and customer data and metadata. The MongoDB breach “We detected suspicious activity on Wednesday (Dec. 13th, 2023) evening US Eastern Standard Time,…

3 ways to reduce stress on the DevSecOps team

I recently moderated a session for the CSO Cybersecurity Summit on building resilience and addressing employee anxiety amid organizational transformation. My session focused on the stresses and burnout experienced by security teams, including recent data showing that 94% of chief…

Facebook and Instagram under fire for insufficient child safety protection measures

Meta’s top brands, including Facebook and Instagram, have lately been under fire for being unable to provide sufficient child safety measures on its social media… The post Facebook and Instagram under fire for insufficient child safety protection measures appeared first…

Ofcom Probes TikTok Over ‘Inaccurate’ Child Protection Data

Ofcom says TikTok may have provided inaccurate data about parental controls, as regulator begins enforcing child online safety rules This article has been indexed from Silicon UK Read the original article: Ofcom Probes TikTok Over ‘Inaccurate’ Child Protection Data

Google Chrome’s New Tracking Protection Limits Website Tracking

Goodbye, third-party cookies. Hello, Tracking Protection!  Chrome, the world’s most popular browser, is taking a major step toward a privacy-first web with the launch of its Tracking Protection feature.  Starting January 4th, this limited rollout marks a turning point in Google’s…

Code Execution Update: Improve WordPress Security

In the ever-evolving landscape of digital security, WordPress has recently released a critical code execution update, version 6.4.2, addressing a potential threat that could jeopardize the integrity of vulnerable sites. This update, triggered by the discovery of a remote code…

A supply chain attack on crypto hardware wallet Ledger led to the theft of $600K

A supply chain attack against Crypto hardware wallet maker Ledger resulted in the theft of $600,000 in virtual assets. Threat actors pushed a malicious version of the “@ledgerhq/connect-kit” npm module developed by crypto hardware wallet maker Ledger, leading to the theft…

The Top 5 Ransomware Takedowns

We discuss the latest ransomware takedowns in the fight against ransomware as law enforcement agencies and cybersecurity organizations successfully disrupt operations, seize infrastructure, and safeguard victims from further attacks. The post The Top 5 Ransomware Takedowns appeared first on Security…

CISA Urges Manufacturers Eliminate Default Passwords to Thwart Cyber Threats

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging manufacturers to get rid of default passwords on internet-exposed systems altogether, citing severe risks that could be exploited by malicious actors to gain initial access to, and move laterally within, organizations. In…

The Corporate Transparency Act: Striking a Pact Between Fact & Privacy Impact

By Tom Aldrich, Chief Strategy Officer, 360 Privacy The Corporate Transparency Act (CTA) became law in the United States as part of the National Defense Authorization Act for FY2021. This […] The post The Corporate Transparency Act: Striking a Pact…

Safeguarding Children and Vulnerable Groups Online Strategies for Enhancing Online Safety in Digital Communities

By Julie Taylor, Tech Principal, Joyn Holdings LTD & Jacob Dahlman, Team Lead, Joyn Holdings LTD In an increasingly digital world, the safety of our children on the internet has […] The post Safeguarding Children and Vulnerable Groups Online Strategies…

Top 7 seven Cyber Attack news headlines trending on Google

MongoDB Inc., a platform specializing in document-oriented storage, has officially disclosed falling victim to a cyber attack on December 13, 2023. This breach potentially allowed hackers to gain unauthorized access to information stored in the MongoDB Corporate database servers. The…

The Intersection of AI and Cybersecurity: Unveiling Threats to Elections

In an era dominated by technological advancements, the integration of Artificial Intelligence (AI) into various aspects of our lives has brought unprecedented convenience and efficiency. However, as we witness the growing reliance on AI, particularly in the realm of elections,…

Creating a formula for effective vulnerability prioritization

In this Help Net Security interview, Michael Gorelik, CTO and Head of Malware Research at Morphisec, provides insights into the business impact of vulnerabilities. Gorelik discusses challenges posed by regulatory frameworks, incomplete asset inventories, and manual methods, while also exploring…

Correct bad network behavior to bolster application experience

Legacy hardware-based applications existed happily in isolation, untethered from a network. The thing that really mattered was the speed of the hard drive and having enough memory. Today, even the software running from personal hard drives relies on other applications…

Preserving privacy through advanced encryption techniques

At its core, encryption involves the use of algorithms, mathematical functions that manipulate data into a seemingly random and indecipherable form. This encoded information, referred to as ciphertext, can only be converted back into its original, meaningful state by those…

Information-blocking rule in 21st Century Cures Act redefines data exchange in healthcare

A Verato survey offers perspectives on the data management strategies of healthcare executives, highlighting the crucial role of Healthcare Master Data Management (hMDM) in addressing key gaps, facilitating seamless data exchange, and aligning with the mandates of the 21st Century…

NKAbuse Malware Attacking Linux Desktops & Use Corn Job for Persistence

Threat actors target Linux systems due to their prevalence in server environments, and cron jobs offer a discreet means of maintaining unauthorized access over an extended period. Kaspersky experts discovered “NKAbuse,” a versatile malware using NKN tech for peer data…

MongoDB warns breach of internal systems exposed customer contact info

PLUS: Cancer patients get ransom notes for Christmas, Delta Dental is the latest MOVEit victim, and critical vulns Infosec in brief  MongoDB on Saturday issued an alert warning of “a security incident involving unauthorized access to certain MongoDB corporate systems,…

The Importance of Cybersecurity Education in Schools

In today’s increasingly interconnected world, the importance of cybersecurity education in schools cannot be overstated. With the rapid advancements in technology, students are becoming more… The post The Importance of Cybersecurity Education in Schools appeared first on Security Zap. This…

Teaching Digital Literacy and Online Safety

In today’s digital age, the ability to navigate and utilize technology effectively is essential. Digital literacy encompasses the skills and knowledge required to access, evaluate,… The post Teaching Digital Literacy and Online Safety appeared first on Security Zap. This article…

Pro-China campaign targeted YouTube with AI avatars

PLUS: Beijing wants ten-minute reporting of infosec incidents; Infosys CFO bails; TikTok’s Indonesia comeback approved, for now Think tank Australian Strategic Policy Institute (ASPI) last week published details of a campaign that spreads English language pro-China and anti-US narratives on…

MongoDB investigates a cyberattack, customer data exposed

MongoDB on Saturday announced it is investigating a cyberattack that exposed customer account metadata and contact information. MongoDB on Saturday disclosed it is investigating a cyber attack against certain corporate systems. MongoDB is a US company that developed the popular…

Utilizing CRQ to empower a shared cybersecurity accountability approach | Kovrr Blog

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Utilizing CRQ to empower a shared cybersecurity accountability approach | Kovrr Blog appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

Hackers Steal Assets Worth $484,000 in Ledger Security Breach

Threat actors responsible for attacking Ledger’s connector library have stolen assets valued at approximately $484,000. This information was given by the blockchain analysis platform Lookonchain. Ledger has said that the security breach might have a large effect, possibly totalling hundreds…

Cybersecurity Incident Causes Outage at Lesotho’s Central Bank

  Lesotho’s central bank is grappling with widespread disruptions following a cyberattack detected earlier this week. The landlocked country, surrounded by South Africa and home to over 2 million people, disclosed multiple statements acknowledging the impact of the recent cyber…

Microsoft Shuts Down a Criminal Ring Responsible for Creating Over 750 Million Fake Accounts

  Microsoft Corp. has shut down a cybercrime group’s US-based infrastructure, which created more than 750 million fake accounts across the company’s services.  Microsoft carried out the takedown with the support of Arkose Labs Inc., a venture-backed cybersecurity firm. The…

China Issues Alert on Geographical Information Data Breaches Impacting Transportation and Military

   China has recently issued a stern warning regarding the use of foreign geographic software, expressing serious concerns about the potential leakage of critical information related to its essential infrastructure and military. The Ministry of State Security, while refraining from…

Digital Guardianship: A Call to Arms for Safeguarding Our Children’s Future

  It is no longer news that children’s lives are becoming increasingly impacted by the digital realm in our modern world. There are a wide array of educational resources, entertainment, and social connections available on the Internet. Despite this, it…

VPN Risk Report

Overview Traditionally, Virtual Private Networks (VPNs) have facilitated basic remote access. The rapid growth in the distributed workforce and increasing adoption of cloud technologies are challenging the basic connectivity that VPN offers. As the threat landscape rapidly evolves, VPNs cannot…

Security Affairs newsletter Round 450 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Hunters…

InfectedSlurs botnet targets QNAP VioStor NVR vulnerability

The Mirai-based botnet InfectedSlurs was spotted targeting QNAP VioStor NVR (Network Video Recorder) devices. In November, Akamai warned of a new Mirai-based DDoS botnet, named InfectedSlurs, actively exploiting two zero-day vulnerabilities to infect routers and video recorder (NVR) devices. The…

Week in review: Apache Struts vulnerability exploit attempt, EOL Sophos firewalls get hotfix

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: SCS 9001 2.0 reveals enhanced controls for global supply chains In this Help Net Security interview, Mike Regan, VP of Business Performance at TIA, discusses…

API Analytics: Unleashing the Power of Data-Driven Insights for Enhanced API Management

In the realm of modern digital integration, Application Programming Interfaces (APIs) have become the linchpin of connectivity, enabling seamless interactions between diverse applications and systems. However, managing APIs effectively is no longer just about designing and deploying them—it’s also about harnessing…