Recorded Future highlighted the vast capabilities of state actors to rapidly weaponize newly disclosed vulnerabilities for geopolitical purposes This article has been indexed from www.infosecurity-magazine.com Read the original article: State-Sponsored Hackers Behind Majority of Vulnerability Exploits
Category: www.infosecurity-magazine.com
TransUnion Data Breach Impacts 4.5 Million US Customers
The credit rating giant revealed that the breach, which occurred on July 28, was caused by unauthorized access to a third-party application This article has been indexed from www.infosecurity-magazine.com Read the original article: TransUnion Data Breach Impacts 4.5 Million US…
Fake IT Support Attacks Hit Microsoft Teams
Fake IT support lures are being used to trick employees into installing remote‑access tools via Microsoft Teams This article has been indexed from www.infosecurity-magazine.com Read the original article: Fake IT Support Attacks Hit Microsoft Teams
Netherlands Confirms China’s Salt Typhoon Targeted Small Dutch Telcos
Salt Typhoon’s primary Dutch targets were small internet service providers and hosting providers This article has been indexed from www.infosecurity-magazine.com Read the original article: Netherlands Confirms China’s Salt Typhoon Targeted Small Dutch Telcos
Malicious VS Code Extensions Exploit Name Reuse Loophole
Visual Studio Code extensions have been identified exploiting a loophole that allows reuse of names from removed packages This article has been indexed from www.infosecurity-magazine.com Read the original article: Malicious VS Code Extensions Exploit Name Reuse Loophole
Nevada Confirms Ransomware Attack, State Data Stolen
Nevada’s CIO confirmed in a press conference that ransomware actors had exfiltrated data from state networks, amid an ongoing incident investigation This article has been indexed from www.infosecurity-magazine.com Read the original article: Nevada Confirms Ransomware Attack, State Data Stolen
Chinese Tech Firms Linked to Salt Typhoon Espionage Campaigns
The US, UK and allies have called out China’s “commercial cyber ecosystem” for enabling large-scale Salt Typhoon campaigns This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Tech Firms Linked to Salt Typhoon Espionage Campaigns
Crypto Companies Freeze $47m in Romance Baiting Funds
Chainalysis, OKX, Binance and Tether have managed to stop nearly $50m reaching romance baiting fraudsters This article has been indexed from www.infosecurity-magazine.com Read the original article: Crypto Companies Freeze $47m in Romance Baiting Funds
Ransomware Actor Deletes Data and Backups Post-Exfiltration on Azure
Microsoft observed Storm-0501 pivot to the victim’s cloud environment to exfiltrate data rapidly and prevent the victim’s recovery This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Actor Deletes Data and Backups Post-Exfiltration on Azure
CISA Strengthens Software Procurement Security With New Tool
CISA has launched a new Software Acquisition Guide Web Tool to enhance security in software procurement This article has been indexed from www.infosecurity-magazine.com Read the original article: CISA Strengthens Software Procurement Security With New Tool
Researchers Discover First Reported AI-Powered Ransomware
While still in development, PromptLock is described as the “first known AI-powered ransomware” by ESET researchers This article has been indexed from www.infosecurity-magazine.com Read the original article: Researchers Discover First Reported AI-Powered Ransomware
Nevada “Network Security Incident” Shuts Down State Offices and Services
The Office of the Governor of Nevada revealed that the incident has shut down in-person State services, while government phone lines and websites are offline This article has been indexed from www.infosecurity-magazine.com Read the original article: Nevada “Network Security Incident”…
ShadowSilk Campaign Targets Central Asian Governments
A series of cyber-attacks against government organizations in Central Asia and Asia- Pacific has been linked to the ShadowSilk threat cluster This article has been indexed from www.infosecurity-magazine.com Read the original article: ShadowSilk Campaign Targets Central Asian Governments
Citrix Patches Three NetScaler Zero Days as One Sees Active Exploitation
Citrix customers are urged to patch their vulnerable NetScaler appliances, but “patching alone won’t cut it,” experts said This article has been indexed from www.infosecurity-magazine.com Read the original article: Citrix Patches Three NetScaler Zero Days as One Sees Active Exploitation
ENISA to Coordinate €36m EU-Wide Incident Response Scheme
EU security agency ENISA is being handed €36m to operate the EU Cybersecurity Reserve This article has been indexed from www.infosecurity-magazine.com Read the original article: ENISA to Coordinate €36m EU-Wide Incident Response Scheme
New Data Theft Campaign Targets Salesforce via Salesloft App
Google is warning of a new credential theft campaign targeting Salesforce customers via Salesloft Drift This article has been indexed from www.infosecurity-magazine.com Read the original article: New Data Theft Campaign Targets Salesforce via Salesloft App
New Phishing Campaign Abuses ConnectWise ScreenConnect to Take Over Devices
Abnormal AI said the campaign, which lures victims into downloading legitimate RMM software, marks a major evolution in phishing tactics This article has been indexed from www.infosecurity-magazine.com Read the original article: New Phishing Campaign Abuses ConnectWise ScreenConnect to Take Over…
New Android Trojan Variant Expands with Ransomware Tactics
A new version of the Hook Android banking Trojan features 107 remote commands, including ransomware overlays This article has been indexed from www.infosecurity-magazine.com Read the original article: New Android Trojan Variant Expands with Ransomware Tactics
Phishing Campaign Uses UpCrypter to Deploy Remote Access Tools
A global phishing campaign has been identified using personalized emails and fake websites to deliver malware via UpCrypter This article has been indexed from www.infosecurity-magazine.com Read the original article: Phishing Campaign Uses UpCrypter to Deploy Remote Access Tools
US: Maryland Confirms Cyber Incident Affecting State Transport Systems
All previously scheduled mobility trips across Maryland for this week will be honored, said the state’s transportation administration This article has been indexed from www.infosecurity-magazine.com Read the original article: US: Maryland Confirms Cyber Incident Affecting State Transport Systems