Tag: http://www.infosecurity-magazine.com/rss/news/76/application-security/

Surveillance Commissioner Blasts Cops for Data Retention

Fraser Sampson says UK police have three million photos of innocent people This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Surveillance Commissioner Blasts Cops for Data Retention

HackerOne Exceeds $300m in Bug Bounty Payments

Thirty hackers have earned over one million dollars each This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: HackerOne Exceeds $300m in Bug Bounty Payments

Boeing Investigates LockBit Ransomware Breach Claims

Group alleges it stole large volume of sensitive data This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Boeing Investigates LockBit Ransomware Breach Claims

Russian Company Offers $20m For Non-NATO Mobile Exploits

Operation Zero will pay $20m for exploits like RCE, LPE and SBX, integral to a full-chain attack This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russian Company Offers $20m For Non-NATO Mobile Exploits

Russian Company Offers $20M For Non-NATO Mobile Exploits

Operation Zero will pay $20m for exploits like RCE, LPE and SBX, integral to a full-chain attack This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russian Company Offers $20M For Non-NATO Mobile Exploits

Microsoft’s Bing AI Faces Malware Threat From Deceptive Ads

Malwarebytes said the goal of these tactics is to lure victims into downloading malicious software This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft’s Bing AI Faces Malware Threat From Deceptive Ads

Phishing, Smishing Surge Targets US Postal Service

The surge in these attacks has prompted DomainTools to delve into their origins and implications This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Phishing, Smishing Surge Targets US Postal Service

MOVEit Developer Patches Critical File Transfer Bugs

CVSS 10.0 flaw was found in the WS_FTP Server software This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: MOVEit Developer Patches Critical File Transfer Bugs

Budworm APT Evolves Toolset, Targets Telecoms and Government

Symantec explained that the attack leveraged a new variant of Budworm’s SysUpdate backdoor This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Budworm APT Evolves Toolset, Targets Telecoms and Government

Booking.com Customers Targeted in Major Phishing Campaign

Perception Point research highlights the extensive reach of this issue, affecting hotels and resorts on a global scale This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Booking.com Customers Targeted in Major Phishing Campaign

Android Banking Trojan Zanubis Evolves to Target Peruvian Users

The Trojan utilizes the Obfuscapk obfuscator for Android APK files, Kaspersky explained This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Android Banking Trojan Zanubis Evolves to Target Peruvian Users

US and Japan Warn of Chinese Router Attacks

BlackTech group blamed for cyber-espionage operation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US and Japan Warn of Chinese Router Attacks

Simple Membership Plugin Flaws Expose WordPress Sites

Patchstack uncovered an unauthenticated role privilege escalation flaw and an account takeover vulnerability This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Simple Membership Plugin Flaws Expose WordPress Sites

Ransomed.vc Group Hits NTT Docomo After Sony Breach Claims

According to Resecurity, Ransomed.vc is demanding a ransom of over $1m from NTT Docomo This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomed.vc Group Hits NTT Docomo After Sony Breach Claims

BEC Attacks Increase By 279% in Healthcare

Abnormal Security also found a 167% increase in advanced email attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: BEC Attacks Increase By 279% in Healthcare

Leading CISO Creates Model for Ransomware Payment Decisions

Lorraine Dryland, CISO at First Sentier Investors, discusses how to help executives make fast and informed decisions when presented with a ransomware demand This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Leading CISO Creates Model for Ransomware…

Cyber-Attacks on Ukraine Surge 123%, But Success Rates Plummet

Russia-backed cyber-attacks in Ukraine jumped 123% in the first half of 2023 – but were less critical than in 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-Attacks on Ukraine Surge 123%, But Success Rates Plummet

Regulator Warns Breaches Can Cost Lives

ICO says handling of domestic abuse victims’ data must improve This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Regulator Warns Breaches Can Cost Lives

NCSC Launches Cyber Incident Exercise Scheme

UK security agency opens scheme to certify assured providers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCSC Launches Cyber Incident Exercise Scheme

More than 30 US Banks Targeted in New Xenomorph Malware Campaign

ThreatFabric explained the malware relies on deceptive phishing webpages posing as a Chrome update This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: More than 30 US Banks Targeted in New Xenomorph Malware Campaign

ZenRAT Malware Uncovered in Bitwarden Impersonation

Discovered by Proofpoint, ZenRAT is a modular remote access trojan targeting Windows users This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ZenRAT Malware Uncovered in Bitwarden Impersonation

ShadowSyndicate Investigation Reveals RaaS Ties

The investigation was conducted by Group-IB, Bridewell and threat researcher Michael Koczwara This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ShadowSyndicate Investigation Reveals RaaS Ties

Half of Cyber-Attacks Go Unreported

Almost half of organizations have failed to report cyber-attacks to the appropriate authorities in 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Half of Cyber-Attacks Go Unreported

Pension Firms Report 4000% Surge in Breaches

Financial services targeted remorselessly over past year This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Pension Firms Report 4000% Surge in Breaches

CISA Publishes Hardware Bill of Materials Framework

Agency says it will help firms better manage supply chain risk This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Publishes Hardware Bill of Materials Framework

Sophisticated APT Clusters Target Southeast Asia

Unit 42 uncovered three separate threat actor clusters: Stately Taurus, Alloy Taurus and Gelsemium This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sophisticated APT Clusters Target Southeast Asia

China-Linked EvilBamboo Targets Mobiles

This extensive operation is directed at Tibetan, Uyghur and Taiwanese individuals and organizations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: China-Linked EvilBamboo Targets Mobiles

Voting Equipment Giants Team Up For Security

The move aims to combat the rampant spread of misinformation among American voters This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Voting Equipment Giants Team Up For Security

Web3 Platform Mixin Network Hit by $200m Crypto Hack

The decentralized finance network has suspended deposits and withdrawals after what could be one of the biggest cyber-attacks on cryptocurrency projects This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Web3 Platform Mixin Network Hit by $200m Crypto…

Almost 900 US Schools Breached Via MOVEit

National Student Clearinghouse reveals more details of incident This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Almost 900 US Schools Breached Via MOVEit

BEC Scammer Pleads Guilty to Part in $6m Scheme

Nigerian was extradited to the US from Canada This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: BEC Scammer Pleads Guilty to Part in $6m Scheme

Almost US 900 Schools Breached Via MOVEit

National Student Clearinghouse reveals more details of incident This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Almost US 900 Schools Breached Via MOVEit

CISA and NFL Collaborate to Secure Super Bowl LVIII

Tabletop exercise assessed the cybersecurity response capabilities, plans and procedures for the event This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA and NFL Collaborate to Secure Super Bowl LVIII

Over 700 Dark Web Ads Offer DDoS Attacks Via IoT in 2023

Kaspersky said these services range from $20 per day to $10,000 a month This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Over 700 Dark Web Ads Offer DDoS Attacks Via IoT in 2023

Elusive Sandman APT Targets Telecom Giants With LuaJIT Toolkit

SentinelLabs said the group’s tactics focus on stealthy lateral movements and minimal interactions This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Elusive Sandman APT Targets Telecom Giants With LuaJIT Toolkit

#mWISE: Why Zero Days Are Set for Highest Year on Record

Experts at the mWISE conference discussed who is behind the surge in zero-day exploits This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #mWISE: Why Zero Days Are Set for Highest Year on Record

UK Security Agency Publishes New Crypto Designs

NCSC hopes research will inform future standards This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Security Agency Publishes New Crypto Designs

Apple Patches Three Actively Exploited Zero-Days

Bugs were found by Citizen Lab and Google This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Apple Patches Three Actively Exploited Zero-Days

UK-US Confirm Agreement for Personal Data Transfers

The agreement, which represents an extension to the EU-US Data Privacy Framework, will enable the free flow of personal data between the UK and US This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK-US Confirm Agreement for…

New Ransomware Victims Surge by 47% with Gangs Targeting Small Businesses

The Trend Micro report observed that small organizations are being increasingly targeted by ransomware gangs, including LockBit and BlackCat This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Ransomware Victims Surge by 47% with Gangs Targeting Small…

Bot Attack Costs Double to $86m Annually

Netacea warns of growing threat from malicious automation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Bot Attack Costs Double to $86m Annually

Scams Now Make Up 75% of Cyber-Threats

Norton report warns generative AI is making an impact This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Scams Now Make Up 75% of Cyber-Threats

US Government in Snatch Ransomware Warning

Experts believe attacks have ramped up recently This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Government in Snatch Ransomware Warning

#mWISE: US to Implement Game-Changing Cyber Mandates on Medical Devices

A new legal requirement for medical devices in the US will introduce the first-ever SBOM mandate for the consumer market This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #mWISE: US to Implement Game-Changing Cyber Mandates on Medical…

International Criminal Court Reveals Security Breach

ICC says it’s putting additional protections in place This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: International Criminal Court Reveals Security Breach

Brits Lose $9.3bn to Scams in a Year

One in 10 have suffered from fraud in past 12 months This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Brits Lose $9.3bn to Scams in a Year

#mWISE: Chinese Cyber Power Bigger Than the Rest of the World Combined

China is rising as a cyber superpower, sponsoring not just ever more highly sophisticated espionage campaigns, but also venturing into cybercrime and disinformation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #mWISE: Chinese Cyber Power Bigger Than…

Chinese Group Exploiting Linux Backdoor to Target Governments

The new backdoor is being used by Earth Lusca to conduct cyber-espionage campaigns, primarily against governments in Asia and the Balkans This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese Group Exploiting Linux Backdoor to Target Governments

Threat Actor Claims Major TransUnion Data Breach

Database compromise dates back to March 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Threat Actor Claims Major TransUnion Data Breach

Clorox Struggling to Recover From August Cyber-Attack

US manufacturer can’t say when operations will return to normal This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clorox Struggling to Recover From August Cyber-Attack

Microsoft AI Researchers Leak 38TB of Private Data

An overly permissive Shared Access Signature (SAS) token was to blame This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft AI Researchers Leak 38TB of Private Data

Another $40m Dispersed to Western Union Fraud Victims

Around 25,000 global victims will receive full compensation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Another $40m Dispersed to Western Union Fraud Victims

TikTok Fined $368m For Child Data Privacy Offenses

Chinese social media giant broke GDPR several times over This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: TikTok Fined $368m For Child Data Privacy Offenses

Cloud to Blame for Almost all Security Vulnerabilities

Palo Alto Networks found that over 45% of organizations’ high-risk exposures in the cloud were due to cloud providers introducing new services This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cloud to Blame for Almost all Security…

China’s Malicious Cyber Activity Informing War Preparations, Pentagon Says

The report says China is likely to launch destructive cyber-attacks against the US Homeland in the event of a military conflict This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: China’s Malicious Cyber Activity Informing War Preparations, Pentagon…

Pirated Software Likely Cause of Airbus Breach

Incident exposed personal information at 3200 vendors This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Pirated Software Likely Cause of Airbus Breach

Elon Musk in Hot Water With FTC Over Twitter Privacy Issues

A new court filing from the US Department of Justice suggests the billionaire “may have jeopardized data privacy and security” at Twitter, now known as X This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Elon Musk in…

Lazarus Group Blamed For $53m Heist at CoinEx

North Korean actors have become prolific crypto-thieves This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Lazarus Group Blamed For $53m Heist at CoinEx

Cloud Vulnerabilities Surge 200% in a Year

But IBM warns credential compromise is number one initial access vector This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cloud Vulnerabilities Surge 200% in a Year

New Microsoft Teams Phishing Campaign Targets Corporate Employees

The new campaign is believed to be perpetrated by Storm-0324, which distributes the payloads of other attackers after achieving initial network compromise This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Microsoft Teams Phishing Campaign Targets Corporate…

MGM Criticized for Repeated Security Failures

The malware researchers’ collective Vx-underground claimed that ALPHV/BlackCat was behind the attack against the casino giant This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: MGM Criticized for Repeated Security Failures

Chilling Lack of Cyber Experts in UK Government, Finds Parliamentary Inquiry

The parliamentary inquiry heard there are “particular shortages” of cybersecurity experts in the civil service, with pay restraints a major factor This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chilling Lack of Cyber Experts in UK Government,…

Microsoft Fixes Two Zero-Day Bugs Used in Attacks

Microsoft announces updates for around 60 CVEs This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Fixes Two Zero-Day Bugs Used in Attacks

Windows Systems Targeted in Multi-Stage Malware Attack

According to Fortinet security expert Cara Lin, the attack begins with a phishing email This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Windows Systems Targeted in Multi-Stage Malware Attack

Cyber-criminals “Jailbreak” AI Chatbots For Malicious Ends

SlashNext research shows that most of these tools connect to jailbroken versions of public chatbots This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-criminals “Jailbreak” AI Chatbots For Malicious Ends

MGM Resorts Hit By Cyber-Attack, Systems Down

The incident disrupted key company services, impacting website, bookings and in-casino functions This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: MGM Resorts Hit By Cyber-Attack, Systems Down

Fighting Individual Ransomware Strains Fruitless, UK Agencies Suggest

The report highlights the complex supply chain involved in ransomware attacks, requiring a more holistic approach to be taken by governments This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Fighting Individual Ransomware Strains Fruitless, UK Agencies Suggest

Redfly Group Compromises National Power Grid

Symantec warns of mounting threat to critical infrastructure This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Redfly Group Compromises National Power Grid

Cuba Ransomware Group Unleashes Undetectable Malware

Kaspersky found suspicious files in December 2022 which activated the komar65 library known as BUGHATCH This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cuba Ransomware Group Unleashes Undetectable Malware

Lazarus Group Targets macOS in Supply Chain Assault

ESET explained the impact of the supply chain attack translated to a 16.8% increase in Trojan detections This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Lazarus Group Targets macOS in Supply Chain Assault

Pentagon Urges Collaboration in Cyber Defense

Beavers emphasized ongoing modernization initiatives for IT architecture and user experience This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Pentagon Urges Collaboration in Cyber Defense

Board Members Struggling to Understand Cyber Risks

The report found that many boards struggle to challenge what they hear about cybersecurity from their organization’s CISO This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Board Members Struggling to Understand Cyber Risks