Tag: http://www.infosecurity-magazine.com/rss/news/76/application-security/

Evil Telegram Mods Removed From Google Play

Researchers warn of spyware hidden in legitimate-looking apps This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Evil Telegram Mods Removed From Google Play

Cyber-criminals Exploit GPUs in Graphic Design Software

Cisco Talos reported that the campaign has been active since at least November 2021 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-criminals Exploit GPUs in Graphic Design Software

Google TAG Exposes North Korean Campaign Targeting Researchers

The team has discovered the exploitation of at least one zero-day flaw in the last few weeks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google TAG Exposes North Korean Campaign Targeting Researchers

Russian Man Handed Nine-Year Sentence for Hacking Scheme

Vladislav Klyushin hacked into US filing agents to discover non-public information about hundreds of companies on the US stock exchange This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russian Man Handed Nine-Year Sentence for Hacking Scheme

CISA Adds Critical RocketMQ Bug to Must-Patch List

Apache flaw can enable remote command execution This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Adds Critical RocketMQ Bug to Must-Patch List

CISA Adds Critical RocketMQ Bug to Must-Patch List

Apache flaw can enable remote command execution This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Adds Critical RocketMQ Bug to Must-Patch List

API Vulnerabilities: 74% of Organizations Report Multiple Breaches

The Traceable report is based on insights from 1629 cybersecurity experts across the US, UK and EU This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: API Vulnerabilities: 74% of Organizations Report Multiple Breaches

DGA Behavior Shifts Raise Cybersecurity Concerns

Akamai found domain shifts of 50 days from expected dates, suggesting hacker-driven confusion This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: DGA Behavior Shifts Raise Cybersecurity Concerns

Zero-Day Flaw Exposes Atlas VPN User IPs

The exploit code, shared by a researcher on Reddit, demonstrates the issue This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Zero-Day Flaw Exposes Atlas VPN User IPs

UK and US Sanction 11 Russians Tied to Conti/TrickBot Ransomware

These new sanctions follow a first wave in February 2023, where seven Russians involved with Trickbot and Conti were also sanctioned This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK and US Sanction 11 Russians Tied to…

IBM Reports Patient Data Breach at Johnson & Johnson Subsidiary

The attackers may have accessed sensitive patient information, such as health insurance and medication details This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: IBM Reports Patient Data Breach at Johnson & Johnson Subsidiary

UK Government Backs Down on Anti-Encryption Stance

Statement to Lords heralds delay to on-device message scanning This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Government Backs Down on Anti-Encryption Stance

MITRE and CISA Release OT Attack Emulation Tool

The open source tool will enable cyber teams to consistently test and boost the defenses of ICS environments This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: MITRE and CISA Release OT Attack Emulation Tool

High-Severity Vulnerability Discovered in Popular CMS

The unpatched bug in PHPFusion could result in the theft of sensitive data, Synopsys researchers warn This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: High-Severity Vulnerability Discovered in Popular CMS

Russia-Backed APT28 Tried to Attack Ukrainian Critical Power Facility

The attack has been carried out using legitimate services and standard software functions, CERT-UA observed This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russia-Backed APT28 Tried to Attack Ukrainian Critical Power Facility

UK Boards Are Growing Less Concerned About Cyber-Risk

Their global peers feel the opposite, according to Proofpoint study This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Boards Are Growing Less Concerned About Cyber-Risk

Experts Uncover Underground Phishing “Empire” W3LL

Secretive group targets specifically Microsoft 365 accounts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Experts Uncover Underground Phishing “Empire” W3LL

Mend.io SAML Vulnerability Exposed

SAML flaw in enabled rogue customers to access others’ SaaS data This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Mend.io SAML Vulnerability Exposed

Airlines Battle Surge in Loyalty Program Fraud

Group-IB said 2022 saw 30% more loyalty fraud, impacting 75+ airlines and involving 2000 malicious sources This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Airlines Battle Surge in Loyalty Program Fraud

More Schools Hit By Cyber-Attacks Before Term Begins

Highgate Wood School forced to delay new term for six days This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: More Schools Hit By Cyber-Attacks Before Term Begins

UK National Cyber Security Centre Gets a New CTO

Industry veteran Ollie Whitehouse is confirmed This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK National Cyber Security Centre Gets a New CTO

Freecycle Breach May Have Hit Millions of Users

Non-profit urges all users to reset passwords This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Freecycle Breach May Have Hit Millions of Users

Python Package Index Targeted Again By VMConnect

ReversingLabs uncovered three additional malevolent packages believed to be part of the campaign This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Python Package Index Targeted Again By VMConnect

New Attack Technique “MalDoc in PDF” Alarms Experts

JPCERT/CC said it can elude detection by embedding a malicious Word file within a PDF document This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Attack Technique “MalDoc in PDF” Alarms Experts

Medical Data Breach: Ayush Jharkhand Hacked

According to CloudSEK, the leaked database contains over 320,000 patient records This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Medical Data Breach: Ayush Jharkhand Hacked

Sensitive Data about UK Military Sites Potentially Leaked by LockBit

Zaun, the UK’s only manufacturer of fencing systems, saw its IT systems being compromised in early August This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sensitive Data about UK Military Sites Potentially Leaked by LockBit

Sydney University Suffers Supply Chain Breach

Blast radius appears limited to international students This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sydney University Suffers Supply Chain Breach

Four Convicted in $18m Investment Fraud Scheme

The Brittingham Group promised outsized returns to victims This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Four Convicted in $18m Investment Fraud Scheme

Suffolk High School Forced Offline After Cyber-Attack

Separate research warns of widespread email security failings This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Suffolk High School Forced Offline After Cyber-Attack

Smishing Triad: China-Based Fraud Network Exposed

Resecurity explained the “Smishing Triad” campaign exclusively utilizes iMessages This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Smishing Triad: China-Based Fraud Network Exposed

Open-Source Malware SapphireStealer Expands

Cisco Talos said SapphireStealer has evolved significantly, resulting in multiple variants This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Open-Source Malware SapphireStealer Expands

Sophisticated Cyber-Espionage Group Earth Estries Exposed

Trend Micro noted that “Earth Estries” employed advanced tactics to infiltrate networks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sophisticated Cyber-Espionage Group Earth Estries Exposed

Adobe ColdFusion Critical Vulnerabilities Exploited Despite Patches

Although the patches for these vulnerabilities have already been released, public attacks are still occurring This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Adobe ColdFusion Critical Vulnerabilities Exploited Despite Patches

Facebook Accounts Targeted by Vietnamese Threat Groups

These groups often sell ads to other cybercriminals, either for a fee or a share of the operations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Facebook Accounts Targeted by Vietnamese Threat Groups

GRU Blamed for Infamous Chisel Malware Targeting Ukraine’s Military Phones

Infamous Chisel, which enables unauthorized access to compromised Android devices used by the Ukrainian military, has been linked to Sandworm This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: GRU Blamed for Infamous Chisel Malware Targeting Ukraine’s Military…

Flaw Exposes WP Migration Plugin to Hacks

The vulnerable code was identified by the security research team at PatchStack This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Flaw Exposes WP Migration Plugin to Hacks

Chinese APT Group GREF Use BadBazaar in Android Espionage

ESET said BadBazaar was available via the Google Play Store, Samsung Galaxy Store and various app sites This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese APT Group GREF Use BadBazaar in Android Espionage

Chinese Hackers Target US, Other Govts With Barracuda Flaw

The campaign deployed many malware families, including Skipjack, DepthCharge, Foxglove and Foxtrot This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese Hackers Target US, Other Govts With Barracuda Flaw

FBI-Led Operation Duck Hunt Shuts Down QakBot Malware

With Operation Duck Hunt, the FBI took control of the botnet, allowed victims to uninstall the malware loader and seized $8.6m in cryptocurrency This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: FBI-Led Operation Duck Hunt Shuts Down…

OpenAI Promises Enterprise-Grade Security with ChatGPT for Business

OpenAI has launched ChatGPT Enterprise highlighting high-profile customers including Klarna, PwC and The Estee Lauder Companies This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: OpenAI Promises Enterprise-Grade Security with ChatGPT for Business

NCSC Issues Cyber Warning Over AI Chatbots

The UK cyber agency highlights the lack of understanding of LLMs among industry and academia This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCSC Issues Cyber Warning Over AI Chatbots

LockBit 3.0 Ransomware Variants Surge Post Builder Leak

Kaspersky explained that LockBit 3.0, also known as LockBit Black, first emerged in June 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: LockBit 3.0 Ransomware Variants Surge Post Builder Leak

New Ransomware Campaign Targets Citrix NetScaler Flaw

Sophos X-Ops suspects the involvement of a well-known ransomware threat actor known as STAC4663 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Ransomware Campaign Targets Citrix NetScaler Flaw

Report Reveals Growing Disparity in Cyber Insurance Landscape

Delinea’s report shows gap grows as firms struggle for cyber insurance, longer policy wait times This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Report Reveals Growing Disparity in Cyber Insurance Landscape

Four in Five Cyber-Attacks Powered by Just Three Malware Loaders

ReliaQuest found that 80% of cyber intrusion campaigns used either QakBot, SocGholish or Raspberry Robin This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Four in Five Cyber-Attacks Powered by Just Three Malware Loaders

Privacy Regulator Warns of Surge in “Text Pest” Cases

Nearly one in three young adults has had their personal information misused This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Privacy Regulator Warns of Surge in “Text Pest” Cases

Researchers Discover Reply URL Takeover Issue in Azure

Vulnerability could be exploited to gain elevated privileges This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Researchers Discover Reply URL Takeover Issue in Azure

FBI Flags $40M Crypto Cash-Out Plot By North Korean Hackers

Between Monday and Tuesday, the FBI has traced approximately 1580 stolen Bitcoins This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: FBI Flags $40M Crypto Cash-Out Plot By North Korean Hackers

Data of 2.6 Million Duolingo Users Leaked on Hacking Forum

The compromised data includes names, usernames, email addresses and internal service-related details This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Data of 2.6 Million Duolingo Users Leaked on Hacking Forum

New Study Sheds Light on Adhubllka Ransomware Network

Netenrich suggested LOLKEK, BIT, OBZ, U2K and TZW ransomware strains share significant similarities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Study Sheds Light on Adhubllka Ransomware Network

NIST Publishes Draft Post-Quantum Cryptography Standards

The draft standards are expected to become the global benchmark for quantum-resistant cybersecurity across the world in 2024 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NIST Publishes Draft Post-Quantum Cryptography Standards

Sextortion Scams Surge 178% in a Year

Emails use social engineering to con victims This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sextortion Scams Surge 178% in a Year

Teens Found Responsible For Lapsus$ Cyber-Attacks

Arion Kurtaj was deemed not fit to stand trial This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Teens Found Responsible For Lapsus$ Cyber-Attacks

Attack Dwell Times Fall but Threat Actors Are Moving Faster

A Sophos report finds that attackers are adapting their approaches in the face of improved detection capabilities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Attack Dwell Times Fall but Threat Actors Are Moving Faster

XLoader MacOS Malware Variant Returns With OfficeNote Facade

SentinelOne observed that the imitating application targeted users within work environments This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: XLoader MacOS Malware Variant Returns With OfficeNote Facade

WinRAR Vulnerability Affects Traders Worldwide

Group-IB said cyber-criminals used the flaw to create archives packaged with DarkMe, GuLoader and Remcos RAT This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: WinRAR Vulnerability Affects Traders Worldwide

Thousands of High-Risk Incidents Neutralized Using AI

Cybersecurity provider Barracuda used AI-powered account profiling to detect nearly a million cyber incidents in 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Thousands of High-Risk Incidents Neutralized Using AI

Experian Pays $650,000 to Settle Spam Claims

Credit reporting firm accused of sending millions of unwanted emails This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Experian Pays $650,000 to Settle Spam Claims

TP-Link Smart Bulb Spills Wi-Fi Passwords

Researchers find four vulnerabilities in popular model This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: TP-Link Smart Bulb Spills Wi-Fi Passwords

Scarab Ransomware Deployed Worldwide Via Spacecolon Toolset

ESET’s investigation also revealed that certain Spacecolon versions contain Turkish strings This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Scarab Ransomware Deployed Worldwide Via Spacecolon Toolset

US ARPA-H Initiative Counters Healthcare Cyber-Threats

DIGIHEALS will call for proposals for technologies originally designed for national security This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US ARPA-H Initiative Counters Healthcare Cyber-Threats

Continued MOVEit Exploitation Drives Record Ransomware Attacks

NCC Group researchers observed 502 ransomware attacks in July 2023, with a large proportion made up of Clop’s continued exploitation of MOVEit This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Continued MOVEit Exploitation Drives Record Ransomware Attacks

Cyber-Attack on Australian Utility Firm Energy One Spreads to UK Systems

Australian utility company Energy One confirmed it had taken steps to limit a cyber-attack affecting its corporate systems This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-Attack on Australian Utility Firm Energy One Spreads to UK Systems

New APT Group Launches Supply Chain Campaign

Legitimate software used to deploy backdoor malware This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New APT Group Launches Supply Chain Campaign

Ivanti Warns of Critical New Zero-Day Bug

Latest vulnerability affects Ivanti Sentry This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ivanti Warns of Critical New Zero-Day Bug

Tesla: Insiders Responsible For Major Data Breach

Two former employees shared information with German newspaper This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Tesla: Insiders Responsible For Major Data Breach

Deceptive AI Bots Spread Malware, Raise Security Concerns

ESET said Facebook promoted the download of what seemed to be Google’s Bard AI tool This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Deceptive AI Bots Spread Malware, Raise Security Concerns

New NCUA Rule Requires Swift Cyber Incident Reporting

Credit unions will be obligated to notify the NCUA about any cyber incident within 72 hours This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New NCUA Rule Requires Swift Cyber Incident Reporting

New Chrome Feature Alerts Users About Malicious Extensions

The feature, called the “Safety Check,” is designed to address three specific scenarios This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Chrome Feature Alerts Users About Malicious Extensions

US Space Industry Under Threat from Foreign Cyber Espionage

An advisory by US intelligence provides guidance for space firms on how to identify an espionage campaign, report and mitigate it This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Space Industry Under Threat from Foreign Cyber…

QR Code Campaign Targets Major Energy Firm

Cofense said that over 29% of the malicious emails were directed at the energy sector giant This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: QR Code Campaign Targets Major Energy Firm

Cybersecurity Study Reveals Web App Vulnerability Crisis

Latest CyCognito report exposes 74% PII vulnerability, prompting urgent data protection This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cybersecurity Study Reveals Web App Vulnerability Crisis

Interpol-Led Africa Cyber Surge II Nets 14 Cybercrime Suspects

The operation identified 20,000 cyber networks associated with financial losses exceeding $40m This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Interpol-Led Africa Cyber Surge II Nets 14 Cybercrime Suspects

UK’s AI Safety Summit Scheduled For Early November

Experts welcome efforts to safeguard society from emerging technologies This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK’s AI Safety Summit Scheduled For Early November

Proxyjacking and Cryptomining Campaign Targets GitLab

Threat actors use several evasion techniques to stay hidden This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Proxyjacking and Cryptomining Campaign Targets GitLab