Over a year has passed since Sophos delivered patches for a vulnerability affecting Sophos Firewalls (CVE-2022-3236) that was being actively exploited by attackers, and now they have pushed additional ones to protect vulnerable EOL devices. “In December 2023, we delivered…
Tag: EN
Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and Phishing
Microsoft has warned that adversaries are using OAuth applications as an automation tool to deploy virtual machines (VMs) for cryptocurrency mining and launch phishing attacks. “Threat actors compromise user accounts to create, modify, and grant high privileges to OAuth applications…
Sophos backports fix for CVE-2022-3236 for EOL firewall firmware versions due to ongoing attacks
Sophos backports the patch for CVE-2022-3236 for end-of-life (EOL) firewall firmware versions due to ongoing attacks exploiting the issue. Sophos backports the fix for the critical code injection vulnerability CVE-2022-3236 for end-of-life (EOL) firewall firmware versions after discovering that threat…
1-15 October 2023 Cyber Attacks Timeline
In the first half of October 2023, I recorded 185 events, a 7.6% increase compared to the previous timeline. Ransomware continues to lead the threat landscape, and the exploitation of vulnerabilities is always strong. This article has been indexed from…
Sophos Patches EOL Firewalls Against Exploited Vulnerability
Sophos has patched EOL Firewall versions against a critical flaw exploited in the wild, after identifying a new exploit. The post Sophos Patches EOL Firewalls Against Exploited Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
Nearly a million non-profit donors’ details left exposed in unsecured database
Trusted by major charities, DonorView publicly exposed children’s names and addresses, among other data Close to a million records containing personally identifiable information belonging to donors that sent money to non-profits were found exposed in an online database.… This article…
Major Cyber Attack Paralyzes Kyivstar – Ukraine’s Largest Telecom Operator
Ukraine’s biggest telecom operator Kyivstar has become the victim of a cyber attack, disrupting customer access to mobile and internet services. “The cyberattack on Ukraine’s #Kyivstar telecoms operator has impacted all regions of the country with high impact to the capital, metrics show,…
Microsoft Fixes 34 CVEs and One Zero-Day in December Patch Tuesday
Microsoft has released updates for dozens of vulnerabilities including one zero-day flaw This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Fixes 34 CVEs and One Zero-Day in December Patch Tuesday
FakeSG campaign, Akira ransomware and AMOS macOS stealer
In this report, we share our latest crimeware findings: FakeSG malware distribution campaign delivering NetSupport RAT, new Conti-like Akira ransomware and AMOS stealer for macOS. This article has been indexed from Securelist Read the original article: FakeSG campaign, Akira ransomware…
Top CISOs to Follow in 2024: Germany Edition
Here are just some of the top CISOs in Germany going into 2024 and some of their insights and experiences we can learn from. The post Top CISOs to Follow in 2024: Germany Edition appeared first on Scytale. The post…
Which cybersecurity controls are organizations struggling with?
How are organizations performing across cybersecurity controls in the Minimum Viable Secure Product (MVSP) framework? A recent analysis by Bitsight and Google reveals some good and some bad results – and room for improvement. What is MVSP? Minimum Viable Secure…
UK Ministry of Defence Fined For Afghan Data Breach
The ICO has fined the Ministry of Defence after an email data breach put lives in danger This article has been indexed from www.infosecurity-magazine.com Read the original article: UK Ministry of Defence Fined For Afghan Data Breach
Tips for Achieving Success With a NERC CIP Audit
Electrical utilities are responsible for just about everything we do. This presents a tremendous burden on those who operate those utilities. One way these organizations offer assurance is through the audit process. While audits can generate tremendous anxiety, good planning,…
Operational Resilience: What It Is and Why It’s Important
Frankly stated, operational resilience is your ability to climb the mountain, no matter the weather. Businesses now need more than a good security structure to weather the storms of AI-driven threats, APTs, cloud-based risks, and hyper-distributed environments. And more importantly,…
Ukraine Claims it “Paralyzed” Russia’s Tax System
Ukrainian Ministry of Defense says cyber-attack wiped Russian tax system servers This article has been indexed from www.infosecurity-magazine.com Read the original article: Ukraine Claims it “Paralyzed” Russia’s Tax System
Cyber security isn’t simple, but it could be
The biggest problem is a tendency to ignore problems you can’t see or haven’t looked for, says SecurityHQ Sponsored Feature Most experts agree cybersecurity is now so complex that managing it has become a security problem in itself.… This article…
December 2023 Microsoft Patch Tuesday fixed 4 critical flaws
Microsoft Patch Tuesday security updates for December 2023 addressed 33 vulnerabilities in multiple products, including a zero-day. Microsoft Patch Tuesday security updates for December 2023 addressed 33 vulnerabilities in multiple products. The vulnerabilities addressed by the company impact Microsoft Windows…
Python 2 EOL: Coping with Legacy System Challenges
Python 2 was officially maintained and supported until January 1, 2020. The system becomes highly vulnerable without Python 2 security updates. TuxCare’s ELS for Python provides security fixes for Python 2.7 versions. Python 2.7 was the last…
Rhysida Ransomware Attacking Government & IT Industries Worldwide
Hackers use ransomware to encrypt victims’ files and demand payment (usually in cryptocurrency) for the decryption key. This malicious tactic allows them to extort money from the following entities by exploiting vulnerabilities in their digital systems:- In May 2023, this…
Ensuring a Secure Future: Global Guidelines for AI Security
Artificial Intelligence (AI) is rapidly transforming industries and societies, offering unprecedented opportunities and efficiencies. However, with the increasing integration of AI into various facets of our lives, concerns about security and ethical considerations have come to the forefront. Establishing global…