Category: http://www.infosecurity-magazine.com/rss/news/76/application-security/

Chinese Group Exploiting Linux Backdoor to Target Governments

The new backdoor is being used by Earth Lusca to conduct cyber-espionage campaigns, primarily against governments in Asia and the Balkans This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese Group Exploiting Linux Backdoor to Target Governments

Threat Actor Claims Major TransUnion Data Breach

Database compromise dates back to March 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Threat Actor Claims Major TransUnion Data Breach

Clorox Struggling to Recover From August Cyber-Attack

US manufacturer can’t say when operations will return to normal This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clorox Struggling to Recover From August Cyber-Attack

Microsoft AI Researchers Leak 38TB of Private Data

An overly permissive Shared Access Signature (SAS) token was to blame This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft AI Researchers Leak 38TB of Private Data

Another $40m Dispersed to Western Union Fraud Victims

Around 25,000 global victims will receive full compensation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Another $40m Dispersed to Western Union Fraud Victims

TikTok Fined $368m For Child Data Privacy Offenses

Chinese social media giant broke GDPR several times over This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: TikTok Fined $368m For Child Data Privacy Offenses

Cloud to Blame for Almost all Security Vulnerabilities

Palo Alto Networks found that over 45% of organizations’ high-risk exposures in the cloud were due to cloud providers introducing new services This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cloud to Blame for Almost all Security…

China’s Malicious Cyber Activity Informing War Preparations, Pentagon Says

The report says China is likely to launch destructive cyber-attacks against the US Homeland in the event of a military conflict This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: China’s Malicious Cyber Activity Informing War Preparations, Pentagon…

Pirated Software Likely Cause of Airbus Breach

Incident exposed personal information at 3200 vendors This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Pirated Software Likely Cause of Airbus Breach

Elon Musk in Hot Water With FTC Over Twitter Privacy Issues

A new court filing from the US Department of Justice suggests the billionaire “may have jeopardized data privacy and security” at Twitter, now known as X This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Elon Musk in…

Lazarus Group Blamed For $53m Heist at CoinEx

North Korean actors have become prolific crypto-thieves This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Lazarus Group Blamed For $53m Heist at CoinEx

Cloud Vulnerabilities Surge 200% in a Year

But IBM warns credential compromise is number one initial access vector This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cloud Vulnerabilities Surge 200% in a Year

New Microsoft Teams Phishing Campaign Targets Corporate Employees

The new campaign is believed to be perpetrated by Storm-0324, which distributes the payloads of other attackers after achieving initial network compromise This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Microsoft Teams Phishing Campaign Targets Corporate…

MGM Criticized for Repeated Security Failures

The malware researchers’ collective Vx-underground claimed that ALPHV/BlackCat was behind the attack against the casino giant This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: MGM Criticized for Repeated Security Failures

Chilling Lack of Cyber Experts in UK Government, Finds Parliamentary Inquiry

The parliamentary inquiry heard there are “particular shortages” of cybersecurity experts in the civil service, with pay restraints a major factor This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chilling Lack of Cyber Experts in UK Government,…

Microsoft Fixes Two Zero-Day Bugs Used in Attacks

Microsoft announces updates for around 60 CVEs This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Fixes Two Zero-Day Bugs Used in Attacks

Windows Systems Targeted in Multi-Stage Malware Attack

According to Fortinet security expert Cara Lin, the attack begins with a phishing email This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Windows Systems Targeted in Multi-Stage Malware Attack

Cyber-criminals “Jailbreak” AI Chatbots For Malicious Ends

SlashNext research shows that most of these tools connect to jailbroken versions of public chatbots This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-criminals “Jailbreak” AI Chatbots For Malicious Ends

MGM Resorts Hit By Cyber-Attack, Systems Down

The incident disrupted key company services, impacting website, bookings and in-casino functions This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: MGM Resorts Hit By Cyber-Attack, Systems Down

Fighting Individual Ransomware Strains Fruitless, UK Agencies Suggest

The report highlights the complex supply chain involved in ransomware attacks, requiring a more holistic approach to be taken by governments This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Fighting Individual Ransomware Strains Fruitless, UK Agencies Suggest

Redfly Group Compromises National Power Grid

Symantec warns of mounting threat to critical infrastructure This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Redfly Group Compromises National Power Grid

Cuba Ransomware Group Unleashes Undetectable Malware

Kaspersky found suspicious files in December 2022 which activated the komar65 library known as BUGHATCH This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cuba Ransomware Group Unleashes Undetectable Malware

Lazarus Group Targets macOS in Supply Chain Assault

ESET explained the impact of the supply chain attack translated to a 16.8% increase in Trojan detections This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Lazarus Group Targets macOS in Supply Chain Assault

Pentagon Urges Collaboration in Cyber Defense

Beavers emphasized ongoing modernization initiatives for IT architecture and user experience This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Pentagon Urges Collaboration in Cyber Defense

Board Members Struggling to Understand Cyber Risks

The report found that many boards struggle to challenge what they hear about cybersecurity from their organization’s CISO This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Board Members Struggling to Understand Cyber Risks

Evil Telegram Mods Removed From Google Play

Researchers warn of spyware hidden in legitimate-looking apps This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Evil Telegram Mods Removed From Google Play

Cyber-criminals Exploit GPUs in Graphic Design Software

Cisco Talos reported that the campaign has been active since at least November 2021 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-criminals Exploit GPUs in Graphic Design Software

Google TAG Exposes North Korean Campaign Targeting Researchers

The team has discovered the exploitation of at least one zero-day flaw in the last few weeks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google TAG Exposes North Korean Campaign Targeting Researchers

Russian Man Handed Nine-Year Sentence for Hacking Scheme

Vladislav Klyushin hacked into US filing agents to discover non-public information about hundreds of companies on the US stock exchange This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russian Man Handed Nine-Year Sentence for Hacking Scheme

CISA Adds Critical RocketMQ Bug to Must-Patch List

Apache flaw can enable remote command execution This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Adds Critical RocketMQ Bug to Must-Patch List

CISA Adds Critical RocketMQ Bug to Must-Patch List

Apache flaw can enable remote command execution This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Adds Critical RocketMQ Bug to Must-Patch List

API Vulnerabilities: 74% of Organizations Report Multiple Breaches

The Traceable report is based on insights from 1629 cybersecurity experts across the US, UK and EU This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: API Vulnerabilities: 74% of Organizations Report Multiple Breaches

DGA Behavior Shifts Raise Cybersecurity Concerns

Akamai found domain shifts of 50 days from expected dates, suggesting hacker-driven confusion This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: DGA Behavior Shifts Raise Cybersecurity Concerns

Zero-Day Flaw Exposes Atlas VPN User IPs

The exploit code, shared by a researcher on Reddit, demonstrates the issue This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Zero-Day Flaw Exposes Atlas VPN User IPs

UK and US Sanction 11 Russians Tied to Conti/TrickBot Ransomware

These new sanctions follow a first wave in February 2023, where seven Russians involved with Trickbot and Conti were also sanctioned This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK and US Sanction 11 Russians Tied to…

IBM Reports Patient Data Breach at Johnson & Johnson Subsidiary

The attackers may have accessed sensitive patient information, such as health insurance and medication details This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: IBM Reports Patient Data Breach at Johnson & Johnson Subsidiary

UK Government Backs Down on Anti-Encryption Stance

Statement to Lords heralds delay to on-device message scanning This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Government Backs Down on Anti-Encryption Stance

MITRE and CISA Release OT Attack Emulation Tool

The open source tool will enable cyber teams to consistently test and boost the defenses of ICS environments This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: MITRE and CISA Release OT Attack Emulation Tool

High-Severity Vulnerability Discovered in Popular CMS

The unpatched bug in PHPFusion could result in the theft of sensitive data, Synopsys researchers warn This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: High-Severity Vulnerability Discovered in Popular CMS

Russia-Backed APT28 Tried to Attack Ukrainian Critical Power Facility

The attack has been carried out using legitimate services and standard software functions, CERT-UA observed This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russia-Backed APT28 Tried to Attack Ukrainian Critical Power Facility

UK Boards Are Growing Less Concerned About Cyber-Risk

Their global peers feel the opposite, according to Proofpoint study This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Boards Are Growing Less Concerned About Cyber-Risk

Experts Uncover Underground Phishing “Empire” W3LL

Secretive group targets specifically Microsoft 365 accounts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Experts Uncover Underground Phishing “Empire” W3LL

Mend.io SAML Vulnerability Exposed

SAML flaw in enabled rogue customers to access others’ SaaS data This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Mend.io SAML Vulnerability Exposed

Airlines Battle Surge in Loyalty Program Fraud

Group-IB said 2022 saw 30% more loyalty fraud, impacting 75+ airlines and involving 2000 malicious sources This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Airlines Battle Surge in Loyalty Program Fraud

More Schools Hit By Cyber-Attacks Before Term Begins

Highgate Wood School forced to delay new term for six days This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: More Schools Hit By Cyber-Attacks Before Term Begins

UK National Cyber Security Centre Gets a New CTO

Industry veteran Ollie Whitehouse is confirmed This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK National Cyber Security Centre Gets a New CTO

Freecycle Breach May Have Hit Millions of Users

Non-profit urges all users to reset passwords This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Freecycle Breach May Have Hit Millions of Users

Python Package Index Targeted Again By VMConnect

ReversingLabs uncovered three additional malevolent packages believed to be part of the campaign This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Python Package Index Targeted Again By VMConnect

New Attack Technique “MalDoc in PDF” Alarms Experts

JPCERT/CC said it can elude detection by embedding a malicious Word file within a PDF document This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Attack Technique “MalDoc in PDF” Alarms Experts

Medical Data Breach: Ayush Jharkhand Hacked

According to CloudSEK, the leaked database contains over 320,000 patient records This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Medical Data Breach: Ayush Jharkhand Hacked

Sensitive Data about UK Military Sites Potentially Leaked by LockBit

Zaun, the UK’s only manufacturer of fencing systems, saw its IT systems being compromised in early August This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sensitive Data about UK Military Sites Potentially Leaked by LockBit

Sydney University Suffers Supply Chain Breach

Blast radius appears limited to international students This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sydney University Suffers Supply Chain Breach

Four Convicted in $18m Investment Fraud Scheme

The Brittingham Group promised outsized returns to victims This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Four Convicted in $18m Investment Fraud Scheme

Suffolk High School Forced Offline After Cyber-Attack

Separate research warns of widespread email security failings This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Suffolk High School Forced Offline After Cyber-Attack

Smishing Triad: China-Based Fraud Network Exposed

Resecurity explained the “Smishing Triad” campaign exclusively utilizes iMessages This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Smishing Triad: China-Based Fraud Network Exposed

Open-Source Malware SapphireStealer Expands

Cisco Talos said SapphireStealer has evolved significantly, resulting in multiple variants This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Open-Source Malware SapphireStealer Expands

Sophisticated Cyber-Espionage Group Earth Estries Exposed

Trend Micro noted that “Earth Estries” employed advanced tactics to infiltrate networks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sophisticated Cyber-Espionage Group Earth Estries Exposed

Adobe ColdFusion Critical Vulnerabilities Exploited Despite Patches

Although the patches for these vulnerabilities have already been released, public attacks are still occurring This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Adobe ColdFusion Critical Vulnerabilities Exploited Despite Patches

Facebook Accounts Targeted by Vietnamese Threat Groups

These groups often sell ads to other cybercriminals, either for a fee or a share of the operations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Facebook Accounts Targeted by Vietnamese Threat Groups

GRU Blamed for Infamous Chisel Malware Targeting Ukraine’s Military Phones

Infamous Chisel, which enables unauthorized access to compromised Android devices used by the Ukrainian military, has been linked to Sandworm This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: GRU Blamed for Infamous Chisel Malware Targeting Ukraine’s Military…

Flaw Exposes WP Migration Plugin to Hacks

The vulnerable code was identified by the security research team at PatchStack This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Flaw Exposes WP Migration Plugin to Hacks

Chinese APT Group GREF Use BadBazaar in Android Espionage

ESET said BadBazaar was available via the Google Play Store, Samsung Galaxy Store and various app sites This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese APT Group GREF Use BadBazaar in Android Espionage

Chinese Hackers Target US, Other Govts With Barracuda Flaw

The campaign deployed many malware families, including Skipjack, DepthCharge, Foxglove and Foxtrot This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese Hackers Target US, Other Govts With Barracuda Flaw

FBI-Led Operation Duck Hunt Shuts Down QakBot Malware

With Operation Duck Hunt, the FBI took control of the botnet, allowed victims to uninstall the malware loader and seized $8.6m in cryptocurrency This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: FBI-Led Operation Duck Hunt Shuts Down…

OpenAI Promises Enterprise-Grade Security with ChatGPT for Business

OpenAI has launched ChatGPT Enterprise highlighting high-profile customers including Klarna, PwC and The Estee Lauder Companies This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: OpenAI Promises Enterprise-Grade Security with ChatGPT for Business

NCSC Issues Cyber Warning Over AI Chatbots

The UK cyber agency highlights the lack of understanding of LLMs among industry and academia This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCSC Issues Cyber Warning Over AI Chatbots

LockBit 3.0 Ransomware Variants Surge Post Builder Leak

Kaspersky explained that LockBit 3.0, also known as LockBit Black, first emerged in June 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: LockBit 3.0 Ransomware Variants Surge Post Builder Leak

New Ransomware Campaign Targets Citrix NetScaler Flaw

Sophos X-Ops suspects the involvement of a well-known ransomware threat actor known as STAC4663 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Ransomware Campaign Targets Citrix NetScaler Flaw

Report Reveals Growing Disparity in Cyber Insurance Landscape

Delinea’s report shows gap grows as firms struggle for cyber insurance, longer policy wait times This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Report Reveals Growing Disparity in Cyber Insurance Landscape

Four in Five Cyber-Attacks Powered by Just Three Malware Loaders

ReliaQuest found that 80% of cyber intrusion campaigns used either QakBot, SocGholish or Raspberry Robin This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Four in Five Cyber-Attacks Powered by Just Three Malware Loaders

Privacy Regulator Warns of Surge in “Text Pest” Cases

Nearly one in three young adults has had their personal information misused This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Privacy Regulator Warns of Surge in “Text Pest” Cases

Researchers Discover Reply URL Takeover Issue in Azure

Vulnerability could be exploited to gain elevated privileges This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Researchers Discover Reply URL Takeover Issue in Azure