Kremlin hunkers down as war enters its second year This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russian Government Bans Foreign Messaging Apps
White House aims to shift cybersecurity burden from individuals, small businesses to tech providers
The Biden administration said software makers should be responsible for taking reasonable precautions to secure their products and services This article has been indexed from Cybersecurity Read the original article: White House aims to shift cybersecurity burden from individuals, small…
Tesla To Build Factory In Mexico, Says President
Mexico’s president Andrés Manuel López Obrador confirms that Tesla will construct factory near border of Texas This article has been indexed from Silicon UK Read the original article: Tesla To Build Factory In Mexico, Says President
New White House cyber strategy looks to redistribute risks, responsibilities
The ranging strategy document includes plans for the collective defense of federal civilian executive branch agencies and a push for legislation to require software vendors to assume liability for the security of their products. This article has been indexed from…
GitHub Secret Scanning Now Generally Available
GitHub this week made secret scanning generally available and free for all public repositories. The post GitHub Secret Scanning Now Generally Available appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article: GitHub…
ICO Calls for Review into Private Message Use by Ministers
Regulator says Hancock saga highlights dangers of using WhatsApp This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ICO Calls for Review into Private Message Use by Ministers
BlackLotus UEFI bootkit disables Windows security mechanisms
ESET researchers have published the first analysis of a UEFI bootkit capable of circumventing UEFI Secure Boot, a critical platform security feature. The functionality of the bootkit and its features make researchers believe that it is a threat known as…
Major Phishing Campaign Targets Trezor Crypto Wallets
Users bombarded with fake emails, texts and calls This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Major Phishing Campaign Targets Trezor Crypto Wallets
Threat actors target law firms with GootLoader and SocGholish malware
Cyber criminals are targeting law firms with GootLoader and FakeUpdates (aka SocGholish) malware families. Researchers from eSentire have foiled 10 cyberattacks targeting six different law firms throughout January and February of 2023. The firms were targeted as part of two distinct campaigns aimed…
Pierce Transit: Bus System In Washington Admits Ransomware Attack
A public transit company ‘Pierce Transit’ operating in sections of Washington state, believed some of its systems were affected by a ransomware attack two weeks ago. The ransomware attack began on February 14 and required Pierce Transit to implement temporary…
SysUpdate Malware Strikes Again with Linux Version and New Evasion Tactics
The threat actor known as Lucky Mouse has developed a Linux version of a malware toolkit called SysUpdate, expanding on its ability to target devices running the operating system. The oldest version of the updated artifact dates back to July 2022, with…
Do you know what your supply chain is and if it is secure?
Forget ChatGPT, the most overhyped security tool is technology itself, Wiz warns
Infosec also needs to widen its tlent pool or miss out Interview It’s a tough economy to ask for a bigger security team or larger budget to buy technology to protect against cyberattacks. … This article has been indexed from The…
Appdome ThreatScope Mobile XDR provides threat intelligence for mobile apps
Appdome has released its next generation ThreatScope product, delivering Extended Detection and Response (XDR) for consumer mobile apps and brands globally. Mobile brands gain the power and agility of XDR to address any cyber, fraud and other attacks in the…
Europe Leads the Cybersecurity Regulation Dance
Europe Leads the Cybersecurity Regulation Dance divya Thu, 03/02/2023 – 06:58 Europe has emerged as a hub for developing cyber policies, acting to improve software security, and quickly reporting severe breaches. The European Commission has introduced some pretty cutting-edge legislation…
Phishing as a Service Stimulates Cybercrime
With phishing attacks at an all-time high, phishing as a service (PhaaS) is turning this once-skilled practice into a pay-to-play industry. Understanding the latest attack tactics is critical to improving your email security strategy. This article has been indexed from…
R3NIN Sniffer Malware Stealing Credit Card Data from E-commerce Consumers
Credit card sniffers or online skimmers are a type of harmful software that cybercriminals often create using the JavaScript programming language. Threat actors primarily use this to steal payment card data and PII from unsuspecting individuals while they transact on…
Cyber resilience in focus: EU act to set strict standards
With the EU Cyber Resilience Act (CRA), the industry is dealing with one of the strictest regulatory requirements. Manufacturers, importers and even distributors of products with digital elements – in other words, anything with a microchip – will be required…
Don’t be fooled by a pretty icon, malicious apps hide in plain sight
Apps, whether for communication, productivity or gaming, are one of the biggest threats to mobile security, according to McAfee. The end of 2022 saw the release of some game-changing applications such as OpenAI’s ChatGPT chatbot and DALL-E 2 image generator.…
Moving target defense must keep cyber attackers guessing
A cybersecurity technique that shuffles network addresses like a blackjack dealer shuffles playing cards could effectively befuddle hackers gambling for control of a military jet, commercial airliner, or spacecraft, according to Sandia National Laboratories and Purdue University researchers. However, the…
Uncovering the most pressing cybersecurity concerns for SMBs
In this Help Net Security video interview, James Edgar, CISO at Fleetcor, discusses what consequences SMBs are most concerned about when it comes to cyberattacks, what technology SMBs are most interested in, and much more. The post Uncovering the most…
Layoffs are set to continue. But workers from this sector may escape
Only 10% of organizations are likely to cut jobs in cybersecurity, compared to an average of 20% in other areas, according to a survey by ISC2. This article has been indexed from Cybersecurity Read the original article: Layoffs are set…
Law firms facing malware cyber threat
From early this year, two malware variants targeted almost 6-7 law firms spread through two separate incidents, alerting whole of the world about the lurking cyber threat. Cybersecurity firm eSentire was the first to uncover the truth as its security…
How to protect your car dealership from cyber-attacks
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Recent trends show that car dealerships are becoming…
Critical Flaw in Cisco IP Phone Series Exposes Users to Command Injection Attack
Cisco on Wednesday rolled out security updates to address a critical flaw impacting its IP Phone 6800, 7800, 7900, and 8800 Series products. The vulnerability, tracked as CVE-2023-20078, is rated 9.8 out of 10 on the CVSS scoring system and is described…
Latest Cyberthreats and Advisories – February 24, 2023
An FBI cyber incident, GoDaddy’s third breach in three years and an NHS data leak highlight a week of major cybersecurity events. Here are the latest threats and advisories for the week of February 24, 2023. Threat Advisories and Alerts …
The Top 5 New Social Engineering Attacks in 2023
By John E. Dunn Forget vanilla phishing attacks – cybercriminals today have much more interesting tricks up their sleeves. MFA Fatigue Attacks When push notification via smartphone first appeared, it looked as if the industry had finally found a type…