Category: http://www.infosecurity-magazine.com/rss/news/76/application-security/

FBI Flags $40M Crypto Cash-Out Plot By North Korean Hackers

Between Monday and Tuesday, the FBI has traced approximately 1580 stolen Bitcoins This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: FBI Flags $40M Crypto Cash-Out Plot By North Korean Hackers

Data of 2.6 Million Duolingo Users Leaked on Hacking Forum

The compromised data includes names, usernames, email addresses and internal service-related details This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Data of 2.6 Million Duolingo Users Leaked on Hacking Forum

New Study Sheds Light on Adhubllka Ransomware Network

Netenrich suggested LOLKEK, BIT, OBZ, U2K and TZW ransomware strains share significant similarities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Study Sheds Light on Adhubllka Ransomware Network

NIST Publishes Draft Post-Quantum Cryptography Standards

The draft standards are expected to become the global benchmark for quantum-resistant cybersecurity across the world in 2024 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NIST Publishes Draft Post-Quantum Cryptography Standards

Sextortion Scams Surge 178% in a Year

Emails use social engineering to con victims This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sextortion Scams Surge 178% in a Year

Teens Found Responsible For Lapsus$ Cyber-Attacks

Arion Kurtaj was deemed not fit to stand trial This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Teens Found Responsible For Lapsus$ Cyber-Attacks

Attack Dwell Times Fall but Threat Actors Are Moving Faster

A Sophos report finds that attackers are adapting their approaches in the face of improved detection capabilities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Attack Dwell Times Fall but Threat Actors Are Moving Faster

XLoader MacOS Malware Variant Returns With OfficeNote Facade

SentinelOne observed that the imitating application targeted users within work environments This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: XLoader MacOS Malware Variant Returns With OfficeNote Facade

WinRAR Vulnerability Affects Traders Worldwide

Group-IB said cyber-criminals used the flaw to create archives packaged with DarkMe, GuLoader and Remcos RAT This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: WinRAR Vulnerability Affects Traders Worldwide

Thousands of High-Risk Incidents Neutralized Using AI

Cybersecurity provider Barracuda used AI-powered account profiling to detect nearly a million cyber incidents in 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Thousands of High-Risk Incidents Neutralized Using AI

Experian Pays $650,000 to Settle Spam Claims

Credit reporting firm accused of sending millions of unwanted emails This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Experian Pays $650,000 to Settle Spam Claims

TP-Link Smart Bulb Spills Wi-Fi Passwords

Researchers find four vulnerabilities in popular model This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: TP-Link Smart Bulb Spills Wi-Fi Passwords

Scarab Ransomware Deployed Worldwide Via Spacecolon Toolset

ESET’s investigation also revealed that certain Spacecolon versions contain Turkish strings This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Scarab Ransomware Deployed Worldwide Via Spacecolon Toolset

US ARPA-H Initiative Counters Healthcare Cyber-Threats

DIGIHEALS will call for proposals for technologies originally designed for national security This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US ARPA-H Initiative Counters Healthcare Cyber-Threats

Continued MOVEit Exploitation Drives Record Ransomware Attacks

NCC Group researchers observed 502 ransomware attacks in July 2023, with a large proportion made up of Clop’s continued exploitation of MOVEit This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Continued MOVEit Exploitation Drives Record Ransomware Attacks

Cyber-Attack on Australian Utility Firm Energy One Spreads to UK Systems

Australian utility company Energy One confirmed it had taken steps to limit a cyber-attack affecting its corporate systems This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-Attack on Australian Utility Firm Energy One Spreads to UK Systems

New APT Group Launches Supply Chain Campaign

Legitimate software used to deploy backdoor malware This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New APT Group Launches Supply Chain Campaign

Ivanti Warns of Critical New Zero-Day Bug

Latest vulnerability affects Ivanti Sentry This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ivanti Warns of Critical New Zero-Day Bug

Tesla: Insiders Responsible For Major Data Breach

Two former employees shared information with German newspaper This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Tesla: Insiders Responsible For Major Data Breach

Deceptive AI Bots Spread Malware, Raise Security Concerns

ESET said Facebook promoted the download of what seemed to be Google’s Bard AI tool This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Deceptive AI Bots Spread Malware, Raise Security Concerns

New NCUA Rule Requires Swift Cyber Incident Reporting

Credit unions will be obligated to notify the NCUA about any cyber incident within 72 hours This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New NCUA Rule Requires Swift Cyber Incident Reporting

New Chrome Feature Alerts Users About Malicious Extensions

The feature, called the “Safety Check,” is designed to address three specific scenarios This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Chrome Feature Alerts Users About Malicious Extensions

US Space Industry Under Threat from Foreign Cyber Espionage

An advisory by US intelligence provides guidance for space firms on how to identify an espionage campaign, report and mitigate it This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Space Industry Under Threat from Foreign Cyber…

QR Code Campaign Targets Major Energy Firm

Cofense said that over 29% of the malicious emails were directed at the energy sector giant This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: QR Code Campaign Targets Major Energy Firm

Cybersecurity Study Reveals Web App Vulnerability Crisis

Latest CyCognito report exposes 74% PII vulnerability, prompting urgent data protection This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cybersecurity Study Reveals Web App Vulnerability Crisis

Interpol-Led Africa Cyber Surge II Nets 14 Cybercrime Suspects

The operation identified 20,000 cyber networks associated with financial losses exceeding $40m This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Interpol-Led Africa Cyber Surge II Nets 14 Cybercrime Suspects

UK’s AI Safety Summit Scheduled For Early November

Experts welcome efforts to safeguard society from emerging technologies This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK’s AI Safety Summit Scheduled For Early November

Proxyjacking and Cryptomining Campaign Targets GitLab

Threat actors use several evasion techniques to stay hidden This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Proxyjacking and Cryptomining Campaign Targets GitLab

Critical Flaws in PowerShell Gallery Enable Malicious Exploits

Aqua Nautilus exposed naming policy, ownership verification and module exposure vulnerabilities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Critical Flaws in PowerShell Gallery Enable Malicious Exploits

CISA Launches Joint Initiative to Secure RMM Software

It was created with industry and government stakeholders via the Joint Cyber Defense Collaborative This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Launches Joint Initiative to Secure RMM Software

Phishing Spree Targets Zimbra Collaboration Account Holders

ESET said the campaign mainly targeted SMEs and governmental entities in Poland, Ecuador and Italy This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Phishing Spree Targets Zimbra Collaboration Account Holders

Ransomware Surges With 1500 Confirmed Victims This Year

A Rapid7 report finds there have been at least 1500 ransomware victims in the first half of 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Surges With 1500 Confirmed Victims This Year

AnonFiles Shuts Down After Massive User Abuse

Anonymous file sharing service puts domain up for sale This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: AnonFiles Shuts Down After Massive User Abuse

Google Fixes 26 Bugs Amid Fake Update Warning

Chrome 116 update fixes eight critical flaws This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google Fixes 26 Bugs Amid Fake Update Warning

Clorox Operations Disrupted By Cyber-Attack

The cyber-attack disrupted manufacturing and distribution processes This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clorox Operations Disrupted By Cyber-Attack

Scammers Exploit Hacked Websites For Phishing

Kaspersky explained one common strategy is the hacking of abandoned or poorly maintained websites This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Scammers Exploit Hacked Websites For Phishing

A Third of UK Uni Students Targeted By Fraud

Delivery scams are the most popular, says NatWest This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: A Third of UK Uni Students Targeted By Fraud

Major LinkedIn Account Takeover Campaign Underway

Global attacks are causing lockouts and ransom attempts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Major LinkedIn Account Takeover Campaign Underway

Digital Safety Advice is Not Getting Through to Women

A lack of inclusivity is failing half the population, say researchers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Digital Safety Advice is Not Getting Through to Women

Discord.io Halts All Operations After Massive Data Breach

Members’ data has been offered for sale as Discord.io investigates breach of its user database This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Discord.io Halts All Operations After Massive Data Breach

Global IoT Trust Survey Reveals Security Concerns

The Ultimaco report suggests only 14% of consumers view smart devices as secure, despite 38% using them This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Global IoT Trust Survey Reveals Security Concerns

New QwixxRAT Trojan Spreads Through Messaging Apps

Uptycs found that QwixxRAT spread via Telegram and Discord This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New QwixxRAT Trojan Spreads Through Messaging Apps

UK Police Data Breach Exposes Victim Information

The disclosure occurred within Freedom of Information responses issued by law enforcement This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Police Data Breach Exposes Victim Information

PSNI: Leaked Data Will be Used to Target Police Officers

The PSNI Chief Constable said he is confident the data is in the hands of Dissident Republican groups This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: PSNI: Leaked Data Will be Used to Target Police Officers

FBI: Mobile Beta-Testing Apps Are Major Security Risk

Device takeover, account hijacking and info theft could occur This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: FBI: Mobile Beta-Testing Apps Are Major Security Risk

Alberta Dental Services Security Breach Exposes 1.47M Records

The breach was discovered on July 9 after an unauthorized third party accessed ADSC’s IT infrastructure This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Alberta Dental Services Security Breach Exposes 1.47M Records

Several Flaws Found in CyberPower and Dataprobe Products

Trellix cybersecurity researchers discussed the implications of these flaws in a new blog post published on Sunday This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Several Flaws Found in CyberPower and Dataprobe Products

Security Researchers Publish Gigabud Banking Malware Analysis

Group-IB said Gigabud doesn’t execute malicious actions immediately but waits for user authorization This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Security Researchers Publish Gigabud Banking Malware Analysis

Microsoft: Critical CODESYS Flaws Could Shut Down Power Plants

The vulnerabilities put critical infrastructure organizations at risk of attacks such as remote code execution (RCE) and denial of service (DoS) This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft: Critical CODESYS Flaws Could Shut Down Power…

Authorities Take Down Lolek Bulletproof Hosting Provider

A Polish national arrested in the US could face up to 45 years in prison if convicted on all counts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Authorities Take Down Lolek Bulletproof Hosting Provider

Multiple Flaws Found in the Avada WordPress Theme and Plugin

The security flaws were uncovered by Patchstack security researcher Rafie Muhammad This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Multiple Flaws Found in the Avada WordPress Theme and Plugin

DroxiDat-Cobalt Strike Duo Targets Power Generator Network

Kaspersky said the attackers deployed the payload to collect valuable system information This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: DroxiDat-Cobalt Strike Duo Targets Power Generator Network

Lapsus$ Hacker Group Exposed in Latest CSRB Report

The CSRB proposed ten concrete recommendations for both governmental bodies and industries This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Lapsus$ Hacker Group Exposed in Latest CSRB Report

DHS to Review Microsoft’s Security in Chinese Email Hack

The review will also conduct a broader review of issues relating to cloud-based identity and authentication infrastructure This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: DHS to Review Microsoft’s Security in Chinese Email Hack

UK Government Slammed For Encryption Mistruths

Technology secretary branded “delusion” This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Government Slammed For Encryption Mistruths

Researchers Suggest Ways to Tackle Thermal Attacks

Device manufacturers and users have a role to play in mitigating the threat This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Researchers Suggest Ways to Tackle Thermal Attacks

APT31 Linked to Recent Industrial Attacks in Eastern Europe

Kaspersky published the third installment of their investigation on this campaign earlier today This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: APT31 Linked to Recent Industrial Attacks in Eastern Europe

Potent Trojans Targeting MacOS Users

A new Bitdefender report finds that attackers are building more sophisticated malware creations tailored to macOS This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Potent Trojans Targeting MacOS Users

#BHUSA: DARPA Challenges AI Pros to Safeguard US Infrastructure

The new AI Cyber Challenge (AIxCC) is sponsored by DARPA, Google, Microsoft, OpenAI, Anthropic and the Open Source Security Foundation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #BHUSA: DARPA Challenges AI Pros to Safeguard US Infrastructure

Fresh Blow to PSNI Security as Second Data Breach Disclosed

This latest incident involved the theft of a spreadsheet containing the names of over 200 serving police officers and staff This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Fresh Blow to PSNI Security as Second Data Breach…

EvilProxy Campaign Fires Out 120,000 Phishing Emails

Threat actors are targeting execs and Microsoft 365 accounts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: EvilProxy Campaign Fires Out 120,000 Phishing Emails

NIST Expands Cybersecurity Framework with New Pillar

Version 2.0 draft is first refresh in nearly a decade This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NIST Expands Cybersecurity Framework with New Pillar

#BHUSA: New Zero-Day Vulnerabilities Could Instantly Drain Crypto Wallets

A number of popular crypto wallet providers have been affected by the vulnerabilities, including Coinbase WaaS, Zengo and Binance This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #BHUSA: New Zero-Day Vulnerabilities Could Instantly Drain Crypto Wallets

Rhysida Ransomware Analysis Reveals Vice Society Connection

Check Point highlighted the necessity of understanding the the entire attack process of ransomware groups This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Rhysida Ransomware Analysis Reveals Vice Society Connection

Northern Ireland Police Officers Vulnerable After Data Leak

The accidental release of PSNI police officers’ names and department has raised huge safety fears This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Northern Ireland Police Officers Vulnerable After Data Leak

Notorious Phishing-as-a-Service Platform Shuttered

Suspected Indonesian admin arrested in multi-national operation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Notorious Phishing-as-a-Service Platform Shuttered

Summer Spending Pressure Fuels Loan Fee Fraud Fears

UK financial regulator in new consumer awareness campaign This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Summer Spending Pressure Fuels Loan Fee Fraud Fears

Tampa General Hospital Sued Over Data Breach

Plaintiffs claim hospital didn’t secure data and worsened the situation by delaying notification This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Tampa General Hospital Sued Over Data Breach

#BHUSA: Ransomware Threat Activity Cluster Uncovered

The elusive ransomware group, Royal, might be collaborating with Hive and Black Basta This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #BHUSA: Ransomware Threat Activity Cluster Uncovered

UK Voters’ Data Exposed in Electoral Commission Cyber-Attack

The attackers accessed personal data of anyone in the UK who was registered to vote between 2014 and 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Voters’ Data Exposed in Electoral Commission Cyber-Attack

Vietnamese-Origin Ransomware Operation Mimics WannaCry Traits

Cisco Talos said what sets this operation apart is the novel approach to delivering ransom notes This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Vietnamese-Origin Ransomware Operation Mimics WannaCry Traits

#BHUSA: Identity Compromise the Cause of Most Breaches

Pushed to the edges by efficient EDRs, threat actors are forced to use living-off-the-land techniques This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #BHUSA: Identity Compromise the Cause of Most Breaches