Tag: http://www.infosecurity-magazine.com/rss/news/76/application-security/

Critical Flaws in PowerShell Gallery Enable Malicious Exploits

Aqua Nautilus exposed naming policy, ownership verification and module exposure vulnerabilities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Critical Flaws in PowerShell Gallery Enable Malicious Exploits

CISA Launches Joint Initiative to Secure RMM Software

It was created with industry and government stakeholders via the Joint Cyber Defense Collaborative This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Launches Joint Initiative to Secure RMM Software

Phishing Spree Targets Zimbra Collaboration Account Holders

ESET said the campaign mainly targeted SMEs and governmental entities in Poland, Ecuador and Italy This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Phishing Spree Targets Zimbra Collaboration Account Holders

Ransomware Surges With 1500 Confirmed Victims This Year

A Rapid7 report finds there have been at least 1500 ransomware victims in the first half of 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Surges With 1500 Confirmed Victims This Year

AnonFiles Shuts Down After Massive User Abuse

Anonymous file sharing service puts domain up for sale This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: AnonFiles Shuts Down After Massive User Abuse

Google Fixes 26 Bugs Amid Fake Update Warning

Chrome 116 update fixes eight critical flaws This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google Fixes 26 Bugs Amid Fake Update Warning

Clorox Operations Disrupted By Cyber-Attack

The cyber-attack disrupted manufacturing and distribution processes This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clorox Operations Disrupted By Cyber-Attack

Scammers Exploit Hacked Websites For Phishing

Kaspersky explained one common strategy is the hacking of abandoned or poorly maintained websites This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Scammers Exploit Hacked Websites For Phishing

A Third of UK Uni Students Targeted By Fraud

Delivery scams are the most popular, says NatWest This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: A Third of UK Uni Students Targeted By Fraud

Major LinkedIn Account Takeover Campaign Underway

Global attacks are causing lockouts and ransom attempts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Major LinkedIn Account Takeover Campaign Underway

Digital Safety Advice is Not Getting Through to Women

A lack of inclusivity is failing half the population, say researchers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Digital Safety Advice is Not Getting Through to Women

Discord.io Halts All Operations After Massive Data Breach

Members’ data has been offered for sale as Discord.io investigates breach of its user database This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Discord.io Halts All Operations After Massive Data Breach

Global IoT Trust Survey Reveals Security Concerns

The Ultimaco report suggests only 14% of consumers view smart devices as secure, despite 38% using them This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Global IoT Trust Survey Reveals Security Concerns

New QwixxRAT Trojan Spreads Through Messaging Apps

Uptycs found that QwixxRAT spread via Telegram and Discord This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New QwixxRAT Trojan Spreads Through Messaging Apps

UK Police Data Breach Exposes Victim Information

The disclosure occurred within Freedom of Information responses issued by law enforcement This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Police Data Breach Exposes Victim Information

PSNI: Leaked Data Will be Used to Target Police Officers

The PSNI Chief Constable said he is confident the data is in the hands of Dissident Republican groups This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: PSNI: Leaked Data Will be Used to Target Police Officers

FBI: Mobile Beta-Testing Apps Are Major Security Risk

Device takeover, account hijacking and info theft could occur This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: FBI: Mobile Beta-Testing Apps Are Major Security Risk

Alberta Dental Services Security Breach Exposes 1.47M Records

The breach was discovered on July 9 after an unauthorized third party accessed ADSC’s IT infrastructure This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Alberta Dental Services Security Breach Exposes 1.47M Records

Several Flaws Found in CyberPower and Dataprobe Products

Trellix cybersecurity researchers discussed the implications of these flaws in a new blog post published on Sunday This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Several Flaws Found in CyberPower and Dataprobe Products

Security Researchers Publish Gigabud Banking Malware Analysis

Group-IB said Gigabud doesn’t execute malicious actions immediately but waits for user authorization This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Security Researchers Publish Gigabud Banking Malware Analysis

Microsoft: Critical CODESYS Flaws Could Shut Down Power Plants

The vulnerabilities put critical infrastructure organizations at risk of attacks such as remote code execution (RCE) and denial of service (DoS) This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft: Critical CODESYS Flaws Could Shut Down Power…

Authorities Take Down Lolek Bulletproof Hosting Provider

A Polish national arrested in the US could face up to 45 years in prison if convicted on all counts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Authorities Take Down Lolek Bulletproof Hosting Provider

Multiple Flaws Found in the Avada WordPress Theme and Plugin

The security flaws were uncovered by Patchstack security researcher Rafie Muhammad This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Multiple Flaws Found in the Avada WordPress Theme and Plugin

DroxiDat-Cobalt Strike Duo Targets Power Generator Network

Kaspersky said the attackers deployed the payload to collect valuable system information This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: DroxiDat-Cobalt Strike Duo Targets Power Generator Network

Lapsus$ Hacker Group Exposed in Latest CSRB Report

The CSRB proposed ten concrete recommendations for both governmental bodies and industries This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Lapsus$ Hacker Group Exposed in Latest CSRB Report

DHS to Review Microsoft’s Security in Chinese Email Hack

The review will also conduct a broader review of issues relating to cloud-based identity and authentication infrastructure This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: DHS to Review Microsoft’s Security in Chinese Email Hack

UK Government Slammed For Encryption Mistruths

Technology secretary branded “delusion” This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Government Slammed For Encryption Mistruths

Researchers Suggest Ways to Tackle Thermal Attacks

Device manufacturers and users have a role to play in mitigating the threat This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Researchers Suggest Ways to Tackle Thermal Attacks

APT31 Linked to Recent Industrial Attacks in Eastern Europe

Kaspersky published the third installment of their investigation on this campaign earlier today This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: APT31 Linked to Recent Industrial Attacks in Eastern Europe

Potent Trojans Targeting MacOS Users

A new Bitdefender report finds that attackers are building more sophisticated malware creations tailored to macOS This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Potent Trojans Targeting MacOS Users

#BHUSA: DARPA Challenges AI Pros to Safeguard US Infrastructure

The new AI Cyber Challenge (AIxCC) is sponsored by DARPA, Google, Microsoft, OpenAI, Anthropic and the Open Source Security Foundation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #BHUSA: DARPA Challenges AI Pros to Safeguard US Infrastructure

Fresh Blow to PSNI Security as Second Data Breach Disclosed

This latest incident involved the theft of a spreadsheet containing the names of over 200 serving police officers and staff This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Fresh Blow to PSNI Security as Second Data Breach…

EvilProxy Campaign Fires Out 120,000 Phishing Emails

Threat actors are targeting execs and Microsoft 365 accounts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: EvilProxy Campaign Fires Out 120,000 Phishing Emails

NIST Expands Cybersecurity Framework with New Pillar

Version 2.0 draft is first refresh in nearly a decade This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NIST Expands Cybersecurity Framework with New Pillar

#BHUSA: New Zero-Day Vulnerabilities Could Instantly Drain Crypto Wallets

A number of popular crypto wallet providers have been affected by the vulnerabilities, including Coinbase WaaS, Zengo and Binance This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #BHUSA: New Zero-Day Vulnerabilities Could Instantly Drain Crypto Wallets

Rhysida Ransomware Analysis Reveals Vice Society Connection

Check Point highlighted the necessity of understanding the the entire attack process of ransomware groups This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Rhysida Ransomware Analysis Reveals Vice Society Connection

Northern Ireland Police Officers Vulnerable After Data Leak

The accidental release of PSNI police officers’ names and department has raised huge safety fears This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Northern Ireland Police Officers Vulnerable After Data Leak

Notorious Phishing-as-a-Service Platform Shuttered

Suspected Indonesian admin arrested in multi-national operation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Notorious Phishing-as-a-Service Platform Shuttered

Summer Spending Pressure Fuels Loan Fee Fraud Fears

UK financial regulator in new consumer awareness campaign This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Summer Spending Pressure Fuels Loan Fee Fraud Fears

Tampa General Hospital Sued Over Data Breach

Plaintiffs claim hospital didn’t secure data and worsened the situation by delaying notification This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Tampa General Hospital Sued Over Data Breach

#BHUSA: Ransomware Threat Activity Cluster Uncovered

The elusive ransomware group, Royal, might be collaborating with Hive and Black Basta This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #BHUSA: Ransomware Threat Activity Cluster Uncovered

UK Voters’ Data Exposed in Electoral Commission Cyber-Attack

The attackers accessed personal data of anyone in the UK who was registered to vote between 2014 and 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Voters’ Data Exposed in Electoral Commission Cyber-Attack

Vietnamese-Origin Ransomware Operation Mimics WannaCry Traits

Cisco Talos said what sets this operation apart is the novel approach to delivering ransom notes This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Vietnamese-Origin Ransomware Operation Mimics WannaCry Traits

#BHUSA: Identity Compromise the Cause of Most Breaches

Pushed to the edges by efficient EDRs, threat actors are forced to use living-off-the-land techniques This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #BHUSA: Identity Compromise the Cause of Most Breaches

North Korean Hackers Compromise Russian Missile Maker

NPO Mashinostroyeniya is under sanctions for supporting Kremlin war machine This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: North Korean Hackers Compromise Russian Missile Maker

Two-Thirds of UK Sites Vulnerable to Bad Bots

Those selling goods and classified ads are particularly exposed This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Two-Thirds of UK Sites Vulnerable to Bad Bots

US Primary Care Services Shuttered After Cyber-Attack

Prospect Medical Holdings took its systems offline on Friday and initiated an investigation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Primary Care Services Shuttered After Cyber-Attack

Invisible Ad Fraud Targets Korean Android Users

McAfee said the library registers device information and drains battery life and mobile data This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Invisible Ad Fraud Targets Korean Android Users

FBI Warns Against Criminals Posing as NFT Developers

Users are tricked into connecting their cryptocurrency wallets to malicious smart contracts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: FBI Warns Against Criminals Posing as NFT Developers

Clop Gang Offers Data Downloads Via Torrents

Latest innovation designed to speed up download process This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clop Gang Offers Data Downloads Via Torrents

Stealthy npm Malware Exposes Developer Data

Phylum said the attack demonstrated a carefully crafted development cycle This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Stealthy npm Malware Exposes Developer Data

CISA Announces 2024-2026 Strategic Plan

The US’ leading cybersecurity agency calls for us to “embody the hacker spirit” in its latest strategic plan This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Announces 2024-2026 Strategic Plan

VMConnect: Python PyPI Threat Imitates Popular Modules

ReversingLabs said the attackers displayed a sophisticated approach and techniques This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: VMConnect: Python PyPI Threat Imitates Popular Modules

Microsoft Warns of Growing Cyber-Threats to Sporting Events

Microsoft observed attackers continually attempting to compromise connected systems at the 2022 World Cup This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Warns of Growing Cyber-Threats to Sporting Events

UK Government: Cyber-Attacks Could Kill or Maim Thousands

Risk assessment predicts critical infrastructure attacks could cost billions This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Government: Cyber-Attacks Could Kill or Maim Thousands

Hacktivist Collective “Mysterious Team Bangladesh” Revealed

Group-IB said the group carried out 750 DDoS attacks and more than 70 website defacements in a year This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Hacktivist Collective “Mysterious Team Bangladesh” Revealed

Cisco Talos Discusses Flaws in SOHO Routers Post-VPNFilter

Over the last five years the firm reported and mitigated 141 advisories, encompassing 289 CVEs This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cisco Talos Discusses Flaws in SOHO Routers Post-VPNFilter

Microsoft Teams Targeted in Midnight Blizzard Phishing Attacks

The Russia-based actor exploited compromised Microsoft 365 tenants owned by small businesses This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Teams Targeted in Midnight Blizzard Phishing Attacks

Cyber-Attacks Targeting Government Agencies Increase 40%

BlackBerry found that public services now rank as the second most targeted industry by threat actors This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-Attacks Targeting Government Agencies Increase 40%

Menlo Leverages Advanced Technology to Combat Surging Browser Threats

Menlo Security co-founder highlights the challenge relating to web browser security and how to overcome them This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Menlo Leverages Advanced Technology to Combat Surging Browser Threats

Humans Unable to Reliably Detect Deepfake Speech

Research from UCL finds that humans struggle to identify deepfake audio This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Humans Unable to Reliably Detect Deepfake Speech

Cocaine Smugglers that Posed as PC Sellers Jailed

Four members behind bars after EncroChat bust This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cocaine Smugglers that Posed as PC Sellers Jailed

Ivanti Patches Yet Another Critical Flaw

Latest bug described as a patch bypass This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ivanti Patches Yet Another Critical Flaw

Manufacturing Sector Reeling From Financial Costs of Ransomware

Analysis by Comparitech found that manufacturers have lost $46.2bn from ransomware attacks in downtime alone since 2018 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Manufacturing Sector Reeling From Financial Costs of Ransomware

AI-Powered CryptoRom Scam Targets Mobile Users

Sophos security researchers shared the findings in a report published today This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: AI-Powered CryptoRom Scam Targets Mobile Users

Cloud Firm Under Scrutiny For Suspected Support of APT Operations

Halcyon said that Cloudzy has been playing a pivotal role in facilitating cyber-criminal activities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cloud Firm Under Scrutiny For Suspected Support of APT Operations

AI-Enhanced Phishing Driving Ransomware Surge

Reported ransomware attacks targeting municipalities, education and healthcare in 2023 has quadrupled compared with 2021 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: AI-Enhanced Phishing Driving Ransomware Surge

Russian Cybersecurity Exec Wanted By Russia and US

Nikita Kislitsin is currently being detained in Kazakhstan This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russian Cybersecurity Exec Wanted By Russia and US

CISA in New Warning Over Ivanti Vulnerabilities

Agency says two bugs are being chained in attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA in New Warning Over Ivanti Vulnerabilities

Novel Worm-Like Malware P2Pinfect Targets Redis Deployments

Cado Security said the malware acts as a botnet and is compatibille with both Windows and Linux This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Novel Worm-Like Malware P2Pinfect Targets Redis Deployments

Canon Inkjet Printers Expose Wi-Fi Threat

The printers retained various information after re-initialization, including SSIDs and passwords This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Canon Inkjet Printers Expose Wi-Fi Threat

Cloud Tech Debt Puts Millions of Apps at Risk, Says New Report

Published by Qualys, the document draws from anonymized global cloud scans conducted in April 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cloud Tech Debt Puts Millions of Apps at Risk, Says New Report

NHS Staff Reprimanded For WhatsApp Data Sharing

Patients’ personal data was shared on the app for years This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NHS Staff Reprimanded For WhatsApp Data Sharing

Capita Boss to Step Down Following Cyber Incident

AWS VP Adolfo Hernandez will replace Jon Lewis as CEO This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Capita Boss to Step Down Following Cyber Incident