Sensitive data from Switzerland government departments were leaked by the Play ransomware group after an attack on Xplain, including classified documents and log in credentials This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Attackers Leak Sensitive…
Category: www.infosecurity-magazine.com
Former Google Engineer Charged With Stealing AI Secrets
Alleged Chinese spy Linwei Ding is accused of stealing proprietary IP from Google This article has been indexed from www.infosecurity-magazine.com Read the original article: Former Google Engineer Charged With Stealing AI Secrets
Hundreds of Rogue Users Added to Unpatched TeamCity Servers
Security experts warn of mass exploitation of critical TeamCity vulnerability This article has been indexed from www.infosecurity-magazine.com Read the original article: Hundreds of Rogue Users Added to Unpatched TeamCity Servers
TA4903 Phishing Campaigns Evolve, Targets US Government
Proofpoint said TA4903 adopted new tactics, including lure themes referencing confidential docs and ACH payments This article has been indexed from www.infosecurity-magazine.com Read the original article: TA4903 Phishing Campaigns Evolve, Targets US Government
TA4903 Phishing Campaigns Evolve, Target US Government
Proofpoint said TA4903 adopted new tactics, including lure themes referencing confidential docs and ACH payments This article has been indexed from www.infosecurity-magazine.com Read the original article: TA4903 Phishing Campaigns Evolve, Target US Government
Linux Malware Targets Docker, Apache Hadoop, Redis and Confluence
Cado said the payloads facilitated RCE attacks by leveraging common misconfigurations and known vulnerabilities This article has been indexed from www.infosecurity-magazine.com Read the original article: Linux Malware Targets Docker, Apache Hadoop, Redis and Confluence
EU Agrees ‘Cyber Solidarity Act’ to Bolster Incident Response and Recovery
The EU has agreed new rules to strengthen cyber incident response and recovery across member states, encompassing closer cooperation mechanisms This article has been indexed from www.infosecurity-magazine.com Read the original article: EU Agrees ‘Cyber Solidarity Act’ to Bolster Incident Response…
Cyber Pros Turn to Cybercrime as Salaries Stagnate
The UK’s Chartered Institute of Information Security warns that many professionals are prepared to moonlight for cybercrime groups This article has been indexed from www.infosecurity-magazine.com Read the original article: Cyber Pros Turn to Cybercrime as Salaries Stagnate
Skype, Google Meet, and Zoom Used in New Trojan Scam Campaign
A new threat actor has been observed by Zscaler distributing remote access Trojans (RATs) via online meeting lures This article has been indexed from www.infosecurity-magazine.com Read the original article: Skype, Google Meet, and Zoom Used in New Trojan Scam Campaign
US Sanctions Predator Spyware Maker Intellexa
The US Treasury has designated individuals and entities associated with Predator spyware developer, Intellexa This article has been indexed from www.infosecurity-magazine.com Read the original article: US Sanctions Predator Spyware Maker Intellexa
US Sanctions Predator Spyware-Maker Intellexa
The US Treasury has designated individuals and entities associated with Predator spyware developer, Intellexa This article has been indexed from www.infosecurity-magazine.com Read the original article: US Sanctions Predator Spyware-Maker Intellexa
GhostSec Evolves With Website Compromise Tools
Cisco Talos uncovered two new tools developed by the group: the “GhostSec Deep Scan tool” and “GhostPresser” This article has been indexed from www.infosecurity-magazine.com Read the original article: GhostSec Evolves With Website Compromise Tools
South Korean Police Develops Deepfake Detection Tool Ahead of April Elections
With a claimed 80% efficiency, the new AI detection tool will be used to inform the police during criminal investigations This article has been indexed from www.infosecurity-magazine.com Read the original article: South Korean Police Develops Deepfake Detection Tool Ahead of…
ALPHV/BlackCat Ransomware Servers Go Down
Speculations about the shut down range from a potential exit scam to a rebranding initiative This article has been indexed from www.infosecurity-magazine.com Read the original article: ALPHV/BlackCat Ransomware Servers Go Down
American Express Warns Credit Card Data Exposed in Third-Party Breach
American Express has informed customers that their credit card details may have been compromised following a breach of a third-party merchant processor This article has been indexed from www.infosecurity-magazine.com Read the original article: American Express Warns Credit Card Data Exposed…
Ukraine Claims it Hacked Russian MoD
Ukraine’s military intelligence service says it hacked and stole sensitive documents from Russia’s Ministry of Defense This article has been indexed from www.infosecurity-magazine.com Read the original article: Ukraine Claims it Hacked Russian MoD
TeamCity Users Urged to Patch Critical Vulnerabilities
JetBrains says on-premises TeamCity servers must be upgraded to mitigate two new bugs This article has been indexed from www.infosecurity-magazine.com Read the original article: TeamCity Users Urged to Patch Critical Vulnerabilities
Self-Propagating Worm Created to Target Generative AI Systems
The researchers developed a worm, dubbed “Morris II,” which targets generative AI ecosystems through the use of adversarial self-replicating prompts This article has been indexed from www.infosecurity-magazine.com Read the original article: Self-Propagating Worm Created to Target Generative AI Systems
Hacktivist Collective NoName057 Strikes European Targets
Sekoia.io observed developments in the group’s DDoS tools, including updates enhancing compatibility with different processor architectures and OS This article has been indexed from www.infosecurity-magazine.com Read the original article: Hacktivist Collective NoName057 Strikes European Targets
TA577 Exploits NTLM Authentication Vulnerability
Proofpoint warned the method could be used for data gathering and further malicious activities This article has been indexed from www.infosecurity-magazine.com Read the original article: TA577 Exploits NTLM Authentication Vulnerability