Category: http://www.infosecurity-magazine.com/rss/news/76/application-security/

North Korean Hackers Compromise Russian Missile Maker

NPO Mashinostroyeniya is under sanctions for supporting Kremlin war machine This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: North Korean Hackers Compromise Russian Missile Maker

Two-Thirds of UK Sites Vulnerable to Bad Bots

Those selling goods and classified ads are particularly exposed This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Two-Thirds of UK Sites Vulnerable to Bad Bots

US Primary Care Services Shuttered After Cyber-Attack

Prospect Medical Holdings took its systems offline on Friday and initiated an investigation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Primary Care Services Shuttered After Cyber-Attack

Invisible Ad Fraud Targets Korean Android Users

McAfee said the library registers device information and drains battery life and mobile data This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Invisible Ad Fraud Targets Korean Android Users

FBI Warns Against Criminals Posing as NFT Developers

Users are tricked into connecting their cryptocurrency wallets to malicious smart contracts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: FBI Warns Against Criminals Posing as NFT Developers

Clop Gang Offers Data Downloads Via Torrents

Latest innovation designed to speed up download process This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clop Gang Offers Data Downloads Via Torrents

Stealthy npm Malware Exposes Developer Data

Phylum said the attack demonstrated a carefully crafted development cycle This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Stealthy npm Malware Exposes Developer Data

CISA Announces 2024-2026 Strategic Plan

The US’ leading cybersecurity agency calls for us to “embody the hacker spirit” in its latest strategic plan This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Announces 2024-2026 Strategic Plan

VMConnect: Python PyPI Threat Imitates Popular Modules

ReversingLabs said the attackers displayed a sophisticated approach and techniques This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: VMConnect: Python PyPI Threat Imitates Popular Modules

Microsoft Warns of Growing Cyber-Threats to Sporting Events

Microsoft observed attackers continually attempting to compromise connected systems at the 2022 World Cup This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Warns of Growing Cyber-Threats to Sporting Events

UK Government: Cyber-Attacks Could Kill or Maim Thousands

Risk assessment predicts critical infrastructure attacks could cost billions This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Government: Cyber-Attacks Could Kill or Maim Thousands

Hacktivist Collective “Mysterious Team Bangladesh” Revealed

Group-IB said the group carried out 750 DDoS attacks and more than 70 website defacements in a year This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Hacktivist Collective “Mysterious Team Bangladesh” Revealed

Cisco Talos Discusses Flaws in SOHO Routers Post-VPNFilter

Over the last five years the firm reported and mitigated 141 advisories, encompassing 289 CVEs This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cisco Talos Discusses Flaws in SOHO Routers Post-VPNFilter

Microsoft Teams Targeted in Midnight Blizzard Phishing Attacks

The Russia-based actor exploited compromised Microsoft 365 tenants owned by small businesses This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Teams Targeted in Midnight Blizzard Phishing Attacks

Cyber-Attacks Targeting Government Agencies Increase 40%

BlackBerry found that public services now rank as the second most targeted industry by threat actors This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-Attacks Targeting Government Agencies Increase 40%

Menlo Leverages Advanced Technology to Combat Surging Browser Threats

Menlo Security co-founder highlights the challenge relating to web browser security and how to overcome them This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Menlo Leverages Advanced Technology to Combat Surging Browser Threats

Humans Unable to Reliably Detect Deepfake Speech

Research from UCL finds that humans struggle to identify deepfake audio This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Humans Unable to Reliably Detect Deepfake Speech

Cocaine Smugglers that Posed as PC Sellers Jailed

Four members behind bars after EncroChat bust This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cocaine Smugglers that Posed as PC Sellers Jailed

Ivanti Patches Yet Another Critical Flaw

Latest bug described as a patch bypass This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ivanti Patches Yet Another Critical Flaw

Manufacturing Sector Reeling From Financial Costs of Ransomware

Analysis by Comparitech found that manufacturers have lost $46.2bn from ransomware attacks in downtime alone since 2018 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Manufacturing Sector Reeling From Financial Costs of Ransomware

AI-Powered CryptoRom Scam Targets Mobile Users

Sophos security researchers shared the findings in a report published today This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: AI-Powered CryptoRom Scam Targets Mobile Users

Cloud Firm Under Scrutiny For Suspected Support of APT Operations

Halcyon said that Cloudzy has been playing a pivotal role in facilitating cyber-criminal activities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cloud Firm Under Scrutiny For Suspected Support of APT Operations

AI-Enhanced Phishing Driving Ransomware Surge

Reported ransomware attacks targeting municipalities, education and healthcare in 2023 has quadrupled compared with 2021 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: AI-Enhanced Phishing Driving Ransomware Surge

Russian Cybersecurity Exec Wanted By Russia and US

Nikita Kislitsin is currently being detained in Kazakhstan This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russian Cybersecurity Exec Wanted By Russia and US

CISA in New Warning Over Ivanti Vulnerabilities

Agency says two bugs are being chained in attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA in New Warning Over Ivanti Vulnerabilities

Novel Worm-Like Malware P2Pinfect Targets Redis Deployments

Cado Security said the malware acts as a botnet and is compatibille with both Windows and Linux This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Novel Worm-Like Malware P2Pinfect Targets Redis Deployments

Canon Inkjet Printers Expose Wi-Fi Threat

The printers retained various information after re-initialization, including SSIDs and passwords This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Canon Inkjet Printers Expose Wi-Fi Threat

Cloud Tech Debt Puts Millions of Apps at Risk, Says New Report

Published by Qualys, the document draws from anonymized global cloud scans conducted in April 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cloud Tech Debt Puts Millions of Apps at Risk, Says New Report

NHS Staff Reprimanded For WhatsApp Data Sharing

Patients’ personal data was shared on the app for years This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NHS Staff Reprimanded For WhatsApp Data Sharing

Capita Boss to Step Down Following Cyber Incident

AWS VP Adolfo Hernandez will replace Jon Lewis as CEO This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Capita Boss to Step Down Following Cyber Incident

SpyNote Android Spyware Strikes Financial Institutions

Cleafy said the malware exploits Accessibility services to conduct multiple malicious activities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: SpyNote Android Spyware Strikes Financial Institutions

APT31 Implants Target Industrial Organizations

The attackers established a channel for data exfiltration, including from air-gapped systems This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: APT31 Implants Target Industrial Organizations

Biden Announces National Cyber Workforce and Education Strategy

The White House says that filling cyber job vacancies is a national security imperative This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Biden Announces National Cyber Workforce and Education Strategy

UK Military Embraces Security by Design

The initiative is designed to transform how cybersecurity is addressed in capability programs across the MoD This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Military Embraces Security by Design

Ongoing STARK#MULE Attack Campaign Discovered

The campaign appears directed at Korean-speaking victims, indicating an origin in North Korea This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ongoing STARK#MULE Attack Campaign Discovered

Global Lawyers Unveil Cyber Best Practices for Execs

International Bar Association offers practical policy recommendations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Global Lawyers Unveil Cyber Best Practices for Execs

Think Tank: Insurers Not Fuelling Ransomware Market

RUSI report makes recommendations for the industry This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Think Tank: Insurers Not Fuelling Ransomware Market

UK MoD Error Sends Emails to Russia’s Ally Instead of US

The MoD clarified that the incident involved fewer than 20 emails and none were top secret This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK MoD Error Sends Emails to Russia’s Ally Instead of US

New Study Reveals Forged Certificate Attack Risks

Attempts can lead to unauthorized access to important company resources This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Study Reveals Forged Certificate Attack Risks

40% of Ubuntu Cloud Workloads Vulnerable to Exploits

Wiz Research said the vulnerabilities were discovered in the Linux filesystem, OverlayFS This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: 40% of Ubuntu Cloud Workloads Vulnerable to Exploits

Microsoft Accused of Negligence in Recent Email Compromise

In an open letter, Senator Ron Wyden urged federal agencies to investigate Microsoft following a Chinese campaign that compromised US government emails This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Accused of Negligence in Recent Email…

Australia and US Issue Warning About Web App Threats

The advisory issues recommendations for developers and end users on reducing the prevalence of access control vulnerabilities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Australia and US Issue Warning About Web App Threats

SSNDOB Marketplace Admin Pleads Guilty

Site was used to trade stolen data This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: SSNDOB Marketplace Admin Pleads Guilty

MOVEit Campaign Claims Millions More Victims

US government services firm is latest to reveal compromise This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: MOVEit Campaign Claims Millions More Victims

Security Incident Impacts CardioComm’s Operations

Several of the company’s products are affected by the outage This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Security Incident Impacts CardioComm’s Operations

China’s Wuhan Earthquake Center Suffers Cyber-Attack

Responding to the news, a Chinese Foreign Ministry Spokesperson claimed the US is engaging in malicious cyber operations across the world This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: China’s Wuhan Earthquake Center Suffers Cyber-Attack

High Severity Vulnerabilities Discovered in Ninja Forms Plugin

The popular forms builder plugin for WordPress has over 900,000 active installations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: High Severity Vulnerabilities Discovered in Ninja Forms Plugin

“Mysterious Elephant” Emerges, Kaspersky Reports

Kaspersky also sheds light on more information related to the “Operation Triangulation” campaign This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: “Mysterious Elephant” Emerges, Kaspersky Reports

OpenAI, Microsoft, Google and Anthropic Form Body to Regulate AI

Four generative AI pioneers launched the Frontier Model Forum, which will focus on ‘safe and responsible’ creation of new AI models This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: OpenAI, Microsoft, Google and Anthropic Form Body to…

NCSC Publishes New Guidance on Shadow IT

Security agency suggests mitigations and technical solutions This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCSC Publishes New Guidance on Shadow IT

Supply Chain Attack Hits NHS Ambulance Trusts

Electronic patient records unavailable for over a week This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Supply Chain Attack Hits NHS Ambulance Trusts

SEC Wants Cyber-Incident Disclosure Within Four Days

More consistent notification rules required of public firms This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: SEC Wants Cyber-Incident Disclosure Within Four Days

Repeatable VEC Attacks Target Critical Infrastructure

Likelihood of a firm falling victim to a VEC attack rose from 45% in June 2022 to 70% in May 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Repeatable VEC Attacks Target Critical Infrastructure

VMware Patches Vulnerability Exposing Admin Credentials

The issue arises from the logging of credentials in hex encoding in platform system audit logs This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: VMware Patches Vulnerability Exposing Admin Credentials

Dark Web Markets Offer New FraudGPT AI Tool

The tool can craft phishing emails, create undetectable malware and identify vulnerable sites This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Dark Web Markets Offer New FraudGPT AI Tool

Ransomware Attacks Skyrocket in Q2 2023

SonicWall’s report finds that ransomware rebounded in Q2 2023 following a major reduction in Q1 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Attacks Skyrocket in Q2 2023

Education Sector Has Highest Ransomware Victim Count

Extortionists know their targets have low tolerance for outages This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Education Sector Has Highest Ransomware Victim Count

Decoy Dog Malware Upgraded to Include New Features

Decoy Dog used DNS for C2 and is suspected to be employed in ongoing nation-state cyber-attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Decoy Dog Malware Upgraded to Include New Features

North Korean Cyber Group Suspected in JumpCloud Breach

Mandiant said the compromise resulted from a sophisticated spear-phishing campaign This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: North Korean Cyber Group Suspected in JumpCloud Breach

Critical Flaws Found in Microsoft Message Queuing Service

FortiGuard Labs described the vulnerabilities in an advisory published on Monday This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Critical Flaws Found in Microsoft Message Queuing Service

UK Government Report Finds Cybersecurity Skills Gap Stagnant

A new report shows that 50% of all UK businesses have a basic cyber security skills gap, and 33% have an advanced skills gap This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Government Report Finds Cybersecurity…

Ivanti Patches Zero-Day Bug Used in Norway Attacks

CVSS 10.0 score means patch should be urgently deployed by customers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ivanti Patches Zero-Day Bug Used in Norway Attacks

Data Breach Costs Hit Record High but Fall For Some

IBM’s annual study finds over half of breached firms pass costs on This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Data Breach Costs Hit Record High but Fall For Some

Biden-Harris Administration Secures AI Commitments For Safety

Amazon, Anthropic, Google, Inflection, Meta, Microsoft and OpenAI all joined the initiative This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Biden-Harris Administration Secures AI Commitments For Safety

Cyber-Attack Strikes Norwegian Government Ministries

Erik Hope revealed the attack was traced back to a vulnerability in a government supplier This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-Attack Strikes Norwegian Government Ministries

Novel Open Source Supply Chain Attacks Target Banking Sector

Checkmarx has identified two distinct open-source software supply chain attacks targeting the financial sector for the first time This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Novel Open Source Supply Chain Attacks Target Banking Sector

Clop Could Make $100m from MOVEit Campaign

Coveware claims small number of victims paid very high ransoms This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clop Could Make $100m from MOVEit Campaign

US DoJ Announces Plan to Shakeup Cybercrime Investigations

In a speech, the DoJ’s Nicole M. Argentieri announced the merger of the NCET into the CCIPS This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US DoJ Announces Plan to Shakeup Cybercrime Investigations

Plurilock Launches Generative AI ‘Guardrails’ Product for Workforces

PromptGuard is a new cloud access security broker (CASB) that supports employee AI use while ensuring that sensitive data is not released to AI systems This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Plurilock Launches Generative AI…

Chinese Hackers Breached Ambassador’s Email

Storm-0558 attack was revealed last week This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese Hackers Breached Ambassador’s Email

Clop Drives Record Ransomware Activity in June

Scores of victims hit by MOVEit campaign This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clop Drives Record Ransomware Activity in June

GitHub Warns Devs of North Korean Attacks

Social engineering campaign designed to deliver malicious npm packages This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: GitHub Warns Devs of North Korean Attacks

New Study Highlights Critical Infrastructure’s Resilience

They exhibited a 20% higher threat detection behavior than the industry average This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Study Highlights Critical Infrastructure’s Resilience

Zyxel Vulnerability Exploited by DDoS Botnets on Linux Systems

Fortinet discovered Multiple DDoS botnets, including Dark.IoT, a variant based on Mirai This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Zyxel Vulnerability Exploited by DDoS Botnets on Linux Systems