Russian state-backed hackers are exploiting a seven-year-old Cisco Smart Install vulnerability (CVE-2018-0171) in end-of-life devices, prompting warnings from the FBI and Cisco Talos This article has been indexed from www.infosecurity-magazine.com Read the original article: Russian Espionage Group Static Tundra Targets…
Category: www.infosecurity-magazine.com
Colt Admits Customer Data Likely Stolen in Cyber-Attack
Colt customers can request a list of filenames posted on the dark web via a dedicated call center This article has been indexed from www.infosecurity-magazine.com Read the original article: Colt Admits Customer Data Likely Stolen in Cyber-Attack
Oregon Man Charged in Rapper Bot DDoS-for-Hire Case
A 22-year-old Oregon man has been charged with administering the Rapper Bot DDoS-for-hire Botnet This article has been indexed from www.infosecurity-magazine.com Read the original article: Oregon Man Charged in Rapper Bot DDoS-for-Hire Case
Cybercriminal Linked to Notorious Scattered Spider Gang Gets 10-Year Sentence
Noah Urban, linked with the Scattered Spider cybercriminal gang, will also pay $13m in restitution to victims This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybercriminal Linked to Notorious Scattered Spider Gang Gets 10-Year Sentence
Orange Data Breach Raises SIM-Swapping Attack Fears
Orange Belgium revealed that a threat actor has compromised 850,000 customer accounts, with SIM card numbers among the data accessed This article has been indexed from www.infosecurity-magazine.com Read the original article: Orange Data Breach Raises SIM-Swapping Attack Fears
NIST Unveils Guidelines to Help Spot Face Morphing Attempts
NIST has released new guidelines examining the pros and cons of detection methods for face morphing software This article has been indexed from www.infosecurity-magazine.com Read the original article: NIST Unveils Guidelines to Help Spot Face Morphing Attempts
“PromptFix” Attacks Could Supercharge Agentic AI Threats
Guardio reveals a new AI take on ClickFix dubbed “PromptFix” This article has been indexed from www.infosecurity-magazine.com Read the original article: “PromptFix” Attacks Could Supercharge Agentic AI Threats
TRM Launches Industry-Wide Platform to Fight Crypto Crimes
With Beacon Network, TRM Labs has brought together law enforcement and some of the largest crypto exchanges to fight against crypto crimes This article has been indexed from www.infosecurity-magazine.com Read the original article: TRM Launches Industry-Wide Platform to Fight Crypto…
Mule Operators in META Adopt Advanced Fraud Schemes
A new report has mapped the tactical evolution of mule operators in the META region from VPNs to advanced fraud networks This article has been indexed from www.infosecurity-magazine.com Read the original article: Mule Operators in META Adopt Advanced Fraud Schemes
Hackers Weaponize QR Codes in New ‘Quishing’ Attacks
Researchers discovered two new phishing techniques where attackers split malicious QR codes or embed them into legitimate ones This article has been indexed from www.infosecurity-magazine.com Read the original article: Hackers Weaponize QR Codes in New ‘Quishing’ Attacks
Warlock Ransomware Hitting Victims Globally Through SharePoint ToolShell Exploit
Trend Micro highlighted a sophisticated post-compromise attack chain to deploy the Warlock ransomware in unpatched SharePoint on-prem environments This article has been indexed from www.infosecurity-magazine.com Read the original article: Warlock Ransomware Hitting Victims Globally Through SharePoint ToolShell Exploit
Executives Warned About Celebrity Podcast Scams
The Better Business Bureau is urging business owners and influencers not to fall for a new type of podcast scam This article has been indexed from www.infosecurity-magazine.com Read the original article: Executives Warned About Celebrity Podcast Scams
UK Retreats on Apple Encryption Backdoor Demand Following US Pressure
US director of national intelligence, Tulsi Gabbard, stated that her government persuaded the UK to withdraw its controversial demand This article has been indexed from www.infosecurity-magazine.com Read the original article: UK Retreats on Apple Encryption Backdoor Demand Following US Pressure
Microsoft Issues Out-of-Band Update to Fix Recovery Issues
Microsoft has issued an emergency patch to fix Windows recovery problems for some users This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Issues Out-of-Band Update to Fix Recovery Issues
ISACA Launches AI-Centric Security Management Certification
ISACA has launched the new AAISM certification to equip security leaders with AI risk management expertise This article has been indexed from www.infosecurity-magazine.com Read the original article: ISACA Launches AI-Centric Security Management Certification
Public Exploit Released for Critical SAP NetWeaver Flaw
A critical flaw in SAP NetWeaver AS Java is being widely exploited, allowing unauthenticated remote code execution This article has been indexed from www.infosecurity-magazine.com Read the original article: Public Exploit Released for Critical SAP NetWeaver Flaw
Allianz Life Data Breach Exposes Personal Data of 1.1 Million Customers
A cyber-attack on Allianz Life, linked to the ShinyHunters group, has exposed the personal information of 1.1 million customers This article has been indexed from www.infosecurity-magazine.com Read the original article: Allianz Life Data Breach Exposes Personal Data of 1.1 Million…
Canadian Financial Regulator Hacked, Exposing Personal Data from Member Organizations
The Canadian Investment Regulatory Organization (CIRO) said it will work to identify the personal information breached and notify those affected This article has been indexed from www.infosecurity-magazine.com Read the original article: Canadian Financial Regulator Hacked, Exposing Personal Data from Member…
Attacker “Patches” Vulnerability Post Exploitation to Lock Out Competition
Red Canary observed the novel tactic in a cluster of activity targeting a legacy vulnerability to access cloud-based Linux systems This article has been indexed from www.infosecurity-magazine.com Read the original article: Attacker “Patches” Vulnerability Post Exploitation to Lock Out Competition
Legitimate Chrome VPN Extension Turns to Browser Spyware
Researchers detected that FreeVPN.One, a longstanding Chrome Web Store VPN extension, recently turned into spyware This article has been indexed from www.infosecurity-magazine.com Read the original article: Legitimate Chrome VPN Extension Turns to Browser Spyware