The notorious Russian hackers known as Sandworm targeted an electrical substation in Ukraine last year, causing a brief power outage in October 2022. The findings come from Google’s Mandiant, which described the hack as a “multi-event cyber attack” leveraging a novel technique…
Tag: EN
The Privacy Disaster of Modern Smart Cars
Article based on a Mozilla report. This article has been indexed from Schneier on Security Read the original article: The Privacy Disaster of Modern Smart Cars
Ransomware Attack on China’s Biggest Bank Disrupts Treasury Market Trades, Reports Say
A ransomware attack on China’s biggest bank, the Industrial and Commercial Bank of China Financial Services, disrupts Treasury market trades. The post Ransomware Attack on China’s Biggest Bank Disrupts Treasury Market Trades, Reports Say appeared first on SecurityWeek. This article…
1.3 Million Maine Residents Impacted by MOVEit Hack
The State of Maine says the personal information of 1.3 million individuals was compromised in the MOVEit attack. The post 1.3 Million Maine Residents Impacted by MOVEit Hack appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…
US Government Issues Guidance on SBOM Consumption
CISA, NSA, and ODNI issue new guidance on managing open source software and SBOMs to maintain awareness on software security. The post US Government Issues Guidance on SBOM Consumption appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Chinese multinational bank hit by ransomware
The state-owned Industrial and Commercial Bank of China (ICBC), which is one of the largest banks in the world, has been hit by a ransomware attack that led to disrupted trades in the US Treasury market. The attack “On November…
Picus Security unveils new capabilities to give security teams full context of their attack surface
Picus Security announced the addition of Picus Attack Surface Validation and AI-driven threat profiling to the Picus Security Validation Platform. The new capabilities give security teams full context of their attack surface so they can accurately prioritize threat exposure based…
Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan
ESET researchers discovered Kamran, previously unknown malware, which spies on Urdu-speaking readers of Hunza News This article has been indexed from WeLiveSecurity Read the original article: Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan
Industrial and Commercial Bank of China (ICBC) suffered a ransomware attack
The Industrial and Commercial Bank of China (ICBC) suffered a ransomware attack that disrupted trades in the US Treasury market. The Industrial and Commercial Bank of China (ICBC) announced it has contained a ransomware attack that disrupted the U.S. Treasury…
Outpost24 CORE advancement delivers complete visibility of technology assets and threat exposure
Outpost24 has made significant updates to its offering with the release of Threat Explorer, an advanced vulnerability intelligence and custom alerting tool for continuous threat monitoring. The new module, available as a part of the Threat Compass threat intelligence solution,…
Russian Hackers Hijacked Power Station Circuit Breakers Using LotL Technique
In a recent and alarming development, the notorious Russia-linked threat actor Sandworm executed a sophisticated cyber-physical attack targeting a critical infrastructure organization in Ukraine. The incident, responded to by cybersecurity firm Mandiant, unfolded as a multi-event assault, showcasing a novel…
Moving To Capability-Based Security With Flow: A Critical Evolution in Blockchain Security
Flow is a permissionless layer-1 blockchain built to support the high-scale use cases of games, virtual worlds, and the digital assets that power them. The blockchain was created by the team behind Cryptokitties, Dapper Labs, and NBA Top Shot. One…
CherryBlos, the malware that steals cryptocurrency via your photos – what you need to know
What’s the deal with CherryBlos? CherryBlos is a rather interesting family of Android malware that can plunder your cryptocurrency accounts – with a little help from your photos. Wait. I’ve heard of hackers stealing photos before, but what do you…
MPs Dangerously Uninformed About Facial Recognition – Report
Privacy International warns UK is “sleepwalking into public mass surveillance” This article has been indexed from www.infosecurity-magazine.com Read the original article: MPs Dangerously Uninformed About Facial Recognition – Report
Cerber Ransomware Exploits Atlassian Confluence Vulnerability CVE-2023-22518
We encountered the Cerber ransomware exploiting the Atlassian Confluence vulnerability CVE-2023-22518 in its operations. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Cerber Ransomware Exploits Atlassian Confluence Vulnerability CVE-2023-22518
BlueNoroff Hackers Attacking Apple Users with New macOS Malware
A new malware variant is distributed by BlueNordoff APT group, a financially motivated threat group targeting cryptocurrency exchanges, venture capital firms, and banks. This new campaign has similar characteristics to their RustBucket campaign. BlueNoroff was first discovered in early 2014…
Balancing functionality and privacy concerns in AI-based Endpoint Security solutions
The integration of Artificial Intelligence (AI) in endpoint security has revolutionized the way organizations protect their devices and data. Ok, let’s take a break here: have you read the article about Artificial Intelligence vs. Machine Learning ? By leveraging…
Hackers Actively Exploiting Big-IP and Citrix Vulnerabilities
Experts issued security alerts concerning the ongoing exploitation of Big-IP (CVE-2023-46747, CVE-2023-46748) and Citrix (CVE-2023-4966) vulnerabilities. The publicly available Proof of Concepts (POCs) for these vulnerabilities were rapidly circulated in cybercrime forums. Over 20,000 “Netscaler” instances and 1,000 “Big IP”…
Electric Ireland Confirms Compromise of 8,000 Customers’ Personal and Financial Data
Electric Ireland, an Irish utility company, released an announcement confirming that 8,000 customer accounts containing personal and financial information may have been compromised. Though the exact details of the breach are unknown, the statement explained that “Electric Ireland is aware…
MOVEit Gang Targets SysAid Customers With Zero-Day Attacks
Lace Tempest looks to spread Clop malware to victims This article has been indexed from www.infosecurity-magazine.com Read the original article: MOVEit Gang Targets SysAid Customers With Zero-Day Attacks