Category: http://www.infosecurity-magazine.com/rss/news/76/application-security/

Final Three Sentenced in £70m Money Laundering Case

London-based group also illegally obtained COVID relief funds This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Final Three Sentenced in £70m Money Laundering Case

Investment Fraud is Now Biggest Cybercrime Earner

Category surged 127% year-on-year, says FBI This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Investment Fraud is Now Biggest Cybercrime Earner

Blackbaud Settles $3m Charge Over Ransomware Attack

SEC claims company filed misleading disclosures This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Blackbaud Settles $3m Charge Over Ransomware Attack

Hadoken Security Group Upgrades Xenomorph Mobile Malware

The trojan can now start specified applications, show push notifications, steal cookies and more This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Hadoken Security Group Upgrades Xenomorph Mobile Malware

White House Allocates $3.1bn to Cybersecurity in New Budget

$145m will go toward making CISA more resilient and defensible This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: White House Allocates $3.1bn to Cybersecurity in New Budget

IceFire Ransomware Targets Linux Enterprise Networks

The campaign leveraged the exploitation of a flaw in IBM’s Aspera Faspex file-sharing software This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: IceFire Ransomware Targets Linux Enterprise Networks

FBI Warns of Crypto-Stealing Play-to-Earn Games

Fake apps are latest scam designed to trick consumers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: FBI Warns of Crypto-Stealing Play-to-Earn Games

UK’s New Privacy Bill Could Mean More Work for Firms

Legal experts also question the impact on consumers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK’s New Privacy Bill Could Mean More Work for Firms

Global Cops Take Down NetWire RAT

Suspected website administrator arrested in Croatia This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Global Cops Take Down NetWire RAT

Remcos Trojan Returns to Most Wanted Malware List After Ukraine Attacks

Weekly attacks targeting Ukraine decreased by 44% between October 2022 and February 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Remcos Trojan Returns to Most Wanted Malware List After Ukraine Attacks

8220 Gang Behind ScrubCrypt Attack Targeting Oracle Weblogic Server

ScrubCrypt malware obfuscates and encrypts applications to evade antivirus detection This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: 8220 Gang Behind ScrubCrypt Attack Targeting Oracle Weblogic Server

Acer Confirms Unauthorized Access But Says No Consumer Data Stolen

Kernelware threat actor claimed responsibility for the hack on a dark web forum This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Acer Confirms Unauthorized Access But Says No Consumer Data Stolen

TikTok Initiates Project Clover Amid European Data Security Concerns

Social media giant TikTok has retaliated to European data security concerns with Project Clover and the announcement of two new data centers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: TikTok Initiates Project Clover Amid European Data…

Understanding the Shared Responsibility Model, Critical Step to Ensure Cloud Security

During the Cloud & Cyber Security Expo, cloud security experts attributed the security shortcomings of cloud users to misconceptions over their responsibility This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Understanding the Shared Responsibility Model, Critical Step…

Tehran Targets Female Activists in Espionage Campaign

Covert crackdown on Mahsa Amini protests continues This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Tehran Targets Female Activists in Espionage Campaign

House Members at Risk After Insurer Data Breach

Threat actor claims to have info on 170,000 victims This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: House Members at Risk After Insurer Data Breach

US RESTRICT Act Gains Support, Empowers Biden to Ban Foreign Tech

The White House and a bipartisan group of 12 senators have endorsed the legislation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US RESTRICT Act Gains Support, Empowers Biden to Ban Foreign Tech

US RESTRICT Act Gains Supports, Empowers Biden to Ban Foreign Tech

The White House and a bipartisan group of 12 senators have endorsed the legislation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US RESTRICT Act Gains Supports, Empowers Biden to Ban Foreign Tech

SYS01 Stealer Targets Critical Infrastructure With Google Ads

The campaign lured Facebook business accounts with Google ads and fake Facebook profiles This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: SYS01 Stealer Targets Critical Infrastructure With Google Ads

Officials Targeted with Romance Scams and Android Trojans

Activity linked to Pakistani state group APT36 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Officials Targeted with Romance Scams and Android Trojans

Government Claims New UK GDPR Will Save Firms Billions

Data Protection and Digital Information Bill designed to reduce paperwork This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Government Claims New UK GDPR Will Save Firms Billions

Cyber-Threat Detections Surge 55% in 2022

Trend Micro stops a record 146 billion discrete threats This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-Threat Detections Surge 55% in 2022

Sharp Panda Targets Southeast Asia in Espionage Campaign Expansion

New campaign leverages a new version of the SoulSearcher loader and the Soul modular framework This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sharp Panda Targets Southeast Asia in Espionage Campaign Expansion

Sharp Panda Target Southeast Asia in Espionage Campaign Expansion

New campaign leverages a new version of the SoulSearcher loader and the Soul modular framework This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sharp Panda Target Southeast Asia in Espionage Campaign Expansion

Shein App Accessed Clipboard Data on Android Devices

The findings come from Microsoft, in an advisory published on Monday This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Shein App Accessed Clipboard Data on Android Devices

Ransomware Attack Against Barcelona Hospital Disrupts Operations

A Catalonia government statement attributed the attack to the threat actor known as RansomHouse This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Attack Against Barcelona Hospital Disrupts Operations

Russia’s Cyber Tactics in Ukraine Shift to Focus on Espionage

Russian state-backed hackers is shifting from disruption tactics, with the likes of wiper attacks, to cyber espionage This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russia’s Cyber Tactics in Ukraine Shift to Focus on Espionage

Just 10% of Firms Can Resolve Cloud Threats in an Hour

Tool bloat is making it harder to detect and contain attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Just 10% of Firms Can Resolve Cloud Threats in an Hour

Brazilian Conglomerate Suffers 3TB Data Breach: Report

“Dark Angels” hacking group targets Andrade Gutierrez This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Brazilian Conglomerate Suffers 3TB Data Breach: Report

Russian Disinformation Campaign Records High-Profile Individuals on Camera

Proofpoint has detailed a sophisticated disinformation campaign in which high-profile individuals are duped into embarrassing comments on video This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russian Disinformation Campaign Records High-Profile Individuals on Camera

Two-Thirds of European Firms Have Started Zero Trust

Forrester claims public sector is leading the way This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Two-Thirds of European Firms Have Started Zero Trust

Almost Half of Industrial Sector Computers Affected By Malware in 2022

Kaspersky said the figures represented a 1.5 increase compared with the second half of 2021 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Almost Half of Industrial Sector Computers Affected By Malware in 2022

EPA Calls For Cybersecurity Improvements in Public Water Systems

The memorandum highlights the need for states to include cybersecurity in periodic audits This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: EPA Calls For Cybersecurity Improvements in Public Water Systems

DoppelPaymer Ransomware Gang Members Busted in Germany, Ukraine

Police also seized electronic equipment and are currently performing forensic examinations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: DoppelPaymer Ransomware Gang Members Busted in Germany, Ukraine

City of Oakland Faces Major Data Leak

Information was stolen during recent ransomware attack This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: City of Oakland Faces Major Data Leak

UK Government Plans Skills Boost for Public Sector Fraud Fight

Focus will be on enhancing prevention and identification skills This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Government Plans Skills Boost for Public Sector Fraud Fight

FTC Proposes $7.8m Fine for BetterHelp

Online counseling service shared health data This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: FTC Proposes $7.8m Fine for BetterHelp

TPM 2.0 Library Vulnerabilities May Affect Billions of IoT Devices

The disclosed flaws occurred when handling malicious TPM 2.0 commands with encrypted parameters This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: TPM 2.0 Library Vulnerabilities May Affect Billions of IoT Devices

New Backdoor MQsTTang Attributed to Mustang Panda Group

Unlike the group’s usual tactics, MQsTTang only has a single stage and does not use obfuscation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Backdoor MQsTTang Attributed to Mustang Panda Group

CISA Warns Against Royal Ransomware in New Advisory

Malicious activity using a particular malware variant has been spotted since September 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Warns Against Royal Ransomware in New Advisory

NCSC: Twitter Users Should Find MFA Alternatives

UK’s security agency warns against letting protection lapse This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCSC: Twitter Users Should Find MFA Alternatives

At Least 30% of “Cyber-Criminals” Are Women: Report

New study uses AI to analyze text of dark web forum users This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: At Least 30% of “Cyber-Criminals” Are Women: Report

Experts Warn of “SMS Pumping” Fraud Epidemic

Small businesses are particularly vulnerable This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Experts Warn of “SMS Pumping” Fraud Epidemic

API Security Flaw Found in Booking.com Allowed Full Account Takeover

The vulnerabilities could affect users logging into the site via their Facebook accounts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: API Security Flaw Found in Booking.com Allowed Full Account Takeover

White House Launches National Cybersecurity Strategy

The Strategy provides guidelines on how companies allocate roles and responsibilities in cyber space This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: White House Launches National Cybersecurity Strategy

WH Smith Discloses Cyber-Attack, Company Data Theft

Employee data was accessed by the threat actors, including names, addresses, and more This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: WH Smith Discloses Cyber-Attack, Company Data Theft

Russian Government Bans Foreign Messaging Apps

Kremlin hunkers down as war enters its second year This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russian Government Bans Foreign Messaging Apps

ICO Calls for Review into Private Message Use by Ministers

Regulator says Hancock saga highlights dangers of using WhatsApp This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ICO Calls for Review into Private Message Use by Ministers

Major Phishing Campaign Targets Trezor Crypto Wallets

Users bombarded with fake emails, texts and calls This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Major Phishing Campaign Targets Trezor Crypto Wallets

Google Workspace Adds Client-Side Encryption to Gmail and Calendar

The move will facilitate compliance procedures for private and public sector organizations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google Workspace Adds Client-Side Encryption to Gmail and Calendar

CISA Shares Advice to Improve Networks’ Monitoring and Hardening

The recommendations stem from a red team assessment conducted in 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Shares Advice to Improve Networks’ Monitoring and Hardening

Public SaaS Assets Are a Major Risk For Medium, Large Firms

The findings come from DoControl’s latest SaaS Security Threat Landscape report This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Public SaaS Assets Are a Major Risk For Medium, Large Firms

Record Number of Mobile Phishing Attacks in 2022

Endpoint security provider Lookout released its Global State of Mobile Phishing Report, which shows an unprecedented rate of mobile phishing attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Record Number of Mobile Phishing Attacks in 2022

Keylogger on Employee Home PC Led to LastPass 2022 Breach

Threat actors obtained credentials and keys later used to access and decrypt some storage volumes This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Keylogger on Employee Home PC Led to LastPass 2022 Breach

Attacker Breakout Time Drops to Just 84 Minutes

Every second counts as threat actors accelerate lateral movement This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Attacker Breakout Time Drops to Just 84 Minutes

Dish Network Confirms Ransomware Outage

Satellite TV provider comes clean in SEC filing This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Dish Network Confirms Ransomware Outage

Researchers Release MortalKombat Ransomware Decryptor

Bitdefender moves in record time to help victims This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Researchers Release MortalKombat Ransomware Decryptor

US Gov. Agencies Have 30 Days to Remove TikTok, Canada Follows Suit

Within 90 days, agencies must also cancel existing contracts that necessitate the app’s use This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Gov. Agencies Have 30 Days to Remove TikTok, Canada Follows Suit

LastPass Data Stolen in August 2022 Breach Used For December Attack

Threat actors obtained credentials and keys later used to access and decrypt some storage volumes This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: LastPass Data Stolen in August 2022 Breach Used For December Attack

Ransomware Attack Hits US Marshals Service

Drew Wade, chief of the Marshals Service public affairs office, made the announcement on Monday This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Attack Hits US Marshals Service

Phone Attacks and MFA Bypass Drive Phishing in 2022

Proofpoint reveals surge in direct financial losses from attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Phone Attacks and MFA Bypass Drive Phishing in 2022

Experts Spot Half a Million Novel Malware Variants in 2022

Overall malware detections also rise after three years of decline This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Experts Spot Half a Million Novel Malware Variants in 2022

London Honeypots Attacked 2000 Times Per Minute

Insurer records 91 million attacks in total in January This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: London Honeypots Attacked 2000 Times Per Minute

News Corp Reveals Two-Year-Long Breach

A threat actor accessed business documents and emails between February 2020 and January 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: News Corp Reveals Two-Year-Long Breach

ChromeLoader Malware Poses as Steam, Nintendo Game Mods

Asec said the malicious activity observed relied on VHD disk image files This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ChromeLoader Malware Poses as Steam, Nintendo Game Mods

North Carolina Business Magnate Indicted in $2bn Fraud Case

Insurance company owner alleged to have skimmed off millions This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: North Carolina Business Magnate Indicted in $2bn Fraud Case

Governments Targeted by Discord-Based Threat Campaign

Threat actor delivers multiple malware types via PureCrypter This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Governments Targeted by Discord-Based Threat Campaign

Police Arrest Trio in Multimillion-Dollar Extortion Case

Men are accused of stealing data on tens of millions of victims This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Police Arrest Trio in Multimillion-Dollar Extortion Case

Privacy Concerns Raised Over Android Apps’ Data Safety Labels

The claims come from Mozilla’s *Privacy Not Included researchers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Privacy Concerns Raised Over Android Apps’ Data Safety Labels

EU Commission Bans TikTok on Corporate Devices

The move aims to protect the Commission against cybersecurity threats This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: EU Commission Bans TikTok on Corporate Devices

Russian IT “Brain Drain” Decentralizes Cybercrime

Recorded Future claims war in Ukraine is having a major impact This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russian IT “Brain Drain” Decentralizes Cybercrime

Investment Scams Drive $9bn in Fraud in 2022

FTC says consumer fraud is up 30% on the previous year This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Investment Scams Drive $9bn in Fraud in 2022

Firms Who Pay Ransom Subsidise 10 New Attacks: Report

Trend Micro urges victim organizations to resist extorters demands This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Firms Who Pay Ransom Subsidise 10 New Attacks: Report

WinorDLL64 Backdoor Linked to Lazarus Group

The Wslink loader can reportedly serve other connecting clients and load additional payloads This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: WinorDLL64 Backdoor Linked to Lazarus Group

Dozens of Malicious ‘HTTP’ Libraries Found on PyPI

ReversingLabs cybersecurity researchers spotted 41 malicious PyPI packages This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Dozens of Malicious ‘HTTP’ Libraries Found on PyPI

Hackers Use S1deload Stealer to Target Facebook, YouTube Users

The malicious software employs DLL sideloading techniques to run its malicious components This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Hackers Use S1deload Stealer to Target Facebook, YouTube Users

ICO Calls on Accountants to Improve SME Data Protection

A fifth of firms use accountants to help with compliance This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ICO Calls on Accountants to Improve SME Data Protection

Russian Invasion Sparks Global Wiper Malware Surge

Fortinet detected a 50% increase in destructive attacks in H2 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russian Invasion Sparks Global Wiper Malware Surge

Phishing Sites and Apps Use ChatGPT as Lure

Campaigns designed to steal card information and install malware This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Phishing Sites and Apps Use ChatGPT as Lure

Open Source Flaws Found in 84% of Codebases

The figures come from Synopsys’ new Open Source Security and Risk Analysis report This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Open Source Flaws Found in 84% of Codebases

Hydrochasma Group Targets Asian Medical and Shipping Sectors

The hackers appear to have a possible interest in industries connected with COVID-19 treatments This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Hydrochasma Group Targets Asian Medical and Shipping Sectors

Npm Packages Used to Distribute Phishing Links

The malicious packages were reportedly created using automated processes This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Npm Packages Used to Distribute Phishing Links

Putin Speech Interrupted by DDoS Attack

Outage impacts Russian state media websites This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Putin Speech Interrupted by DDoS Attack

Time Taken to Deploy Ransomware Drops 94%

Extortion found to be most common impact from cyber-attacks in 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Time Taken to Deploy Ransomware Drops 94%

Call of Duty Developer Confirms Phishing Attempt but Not Breach

Security researchers say hackers successfully exfiltrated content This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Call of Duty Developer Confirms Phishing Attempt but Not Breach

New Privilege Escalation Bug Class Found on macOS and iOS

The new class of privilege escalation bugs is based on the ForcedEntry attack This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Privilege Escalation Bug Class Found on macOS and iOS

Hackers Exploit Privilege Escalation Flaw on Windows Backup Service

The flaw is triggered using the Race Condition between temporary file creation and deletion This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Hackers Exploit Privilege Escalation Flaw on Windows Backup Service

Researchers Uncover New Information Stealer ‘Stealc’

Stealc is a fully featured stealer, whose development relied on Vidar, Raccoon, Mars and Redline This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Researchers Uncover New Information Stealer ‘Stealc’

City Fund Managers Jailed for $8m Fraud

Trio get 12 years behind bars This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: City Fund Managers Jailed for $8m Fraud

Ransomware Gang Seeks to Exploit Victims’ Insurance Coverage

Ransomware group tries to demonize carriers in negotiations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Gang Seeks to Exploit Victims’ Insurance Coverage

Ransomware Gang Seeks to Exploit Victim’s Insurance Coverage

Ransomware group tries to demonize carriers in negotiations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Gang Seeks to Exploit Victim’s Insurance Coverage

Fifth of Brits Have Fallen Victim to Online Scammers

Many don’t have any security controls in place, says F-Secure This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Fifth of Brits Have Fallen Victim to Online Scammers

Samsung Launches Message Guard to Protect Users From Cyber-Threats

The feature provides a sandbox layer isolating some image files from the rest of the device This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Samsung Launches Message Guard to Protect Users From Cyber-Threats

GoDaddy Announces Source Code Stolen and Malware Installed in Breach

An unauthorized party caused the intermittent redirection of customer websites This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: GoDaddy Announces Source Code Stolen and Malware Installed in Breach

Frebniis Malware Exploits Microsoft IIS Feature

The malware was used by a previously unknown threat actor against targets in Taiwan This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Frebniis Malware Exploits Microsoft IIS Feature

FBI “Contains” Cyber-Incident on its Network

Question marks remain over what happened at New York field office This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: FBI “Contains” Cyber-Incident on its Network