Category: http://www.infosecurity-magazine.com/rss/news/76/application-security/

CNI Firms: Climate Tech is Increasing Cyber Risk

UK’s critical infrastructure sector concerned over expanding attack surface This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CNI Firms: Climate Tech is Increasing Cyber Risk

Estee Lauder Breached by Two Ransomware Groups

Cosmetics giant confirms data was taken This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Estee Lauder Breached by Two Ransomware Groups

Chinese APT41 Linked to WyrmSpy and DragonEgg Surveillanceware

Lookout attributed WyrmSpy and DragonEgg to APT41 due to overlapping Android signing certificates This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese APT41 Linked to WyrmSpy and DragonEgg Surveillanceware

Critical API Security Gaps Found in Financial Services

The Salt Security report also notes a 244% surge in unique attackers between H1 and H2 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Critical API Security Gaps Found in Financial Services

Biden-Harris Administration Unveils Smart Device Cyber Program

The criteria for certification are set to be based on cybersecurity guidelines published by NIST This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Biden-Harris Administration Unveils Smart Device Cyber Program

Industry Experts Urge CISA to Update Secure by Design Guidance

A letter authored by industry experts says that CISA should include specific details on how to implement security-by-design through threat modeling This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Industry Experts Urge CISA to Update Secure by…

Scam Job Offers Target Uni Students

Threat actors exploit high cost of living This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Scam Job Offers Target Uni Students

New Vulnerabilities Found in Adobe ColdFusion

Rapid7 has observed that some vulnerabilities in Adobe ColdFusion were still being exploited several days after the patches were published This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Vulnerabilities Found in Adobe ColdFusion

CISA Unveils Guide to Aid Firms Transition to Cloud Security

It mentions the CSET, SCuBAGear, Untitled Goose Tool, Decider and Memory Forensic on Cloud This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Unveils Guide to Aid Firms Transition to Cloud Security

drIBAN Fraud Operations Target Corporate Banking Customers

The web injects allow cyber-criminals to manipulate legitimate web pages’ content in real time This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: drIBAN Fraud Operations Target Corporate Banking Customers

JumpCloud Confirms Data Breach By Nation-State Actor

The attack vector was identified as data injection into the firm’s commands framework This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: JumpCloud Confirms Data Breach By Nation-State Actor

IT Security Pro Jailed for Attempted Extortion

Hertfordshire man pleaded guilty in May This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: IT Security Pro Jailed for Attempted Extortion

BreachForums Admin Pleads Guilty to Hacking Charges

The guilty plea also covered a separate count of possession of child pornography This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: BreachForums Admin Pleads Guilty to Hacking Charges

Sorillus RAT and Phishing Attacks Exploit Google Firebase Hosting

eSentire found the threat after detecting suspicious code in a manufacturing customer’s network This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sorillus RAT and Phishing Attacks Exploit Google Firebase Hosting

EU Urged to Prepare for Quantum Cyber-Attacks

A discussion paper from the European Policy Centre sets out recommendations for an EU quantum cybersecurity agenda This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: EU Urged to Prepare for Quantum Cyber-Attacks

Acting White House Cyber Director Withdraws Nomination

Reports suggest personal debt behind Kemba Walden’s decision This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Acting White House Cyber Director Withdraws Nomination

New Threat Actor Launches Cyber-attacks on Ukraine and Poland

Cisco Talos said the malicious campaigns started in April 2022 and are currently ongoing This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Threat Actor Launches Cyber-attacks on Ukraine and Poland

LokiBot Malware Targets Windows Users in Office Document Attacks

Fortinet suggests attackers are leveraging vulnerabilities like CVE-2021-40444 and CVE-2022-30190 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: LokiBot Malware Targets Windows Users in Office Document Attacks

Chinese APT Favorite Backdoor Found in Pakistani Government App

Trend Micro found a backdoor previously exploited by various Chinese threat actors in a popular application used by Pakistan’s government agencies This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese APT Favorite Backdoor Found in Pakistani Government…

NCSC Shares Alternatives to Using a SOC

Security agency’s advice could help save time and money This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCSC Shares Alternatives to Using a SOC

New CVSS Version Unveiled Amid Rising Cyber Threats

FIRST has released details of version 4.0 of the standard, which aims to address criticisms of CVSS 3.1 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New CVSS Version Unveiled Amid Rising Cyber Threats

Mandiant Unveils Russian GRU’s Cyber Playbook Against Ukraine

Mandiant has observed that the same playbook has been used by various Russian threat actors since the breakout of war in Ukraine, making them likely to be part of a GRU-led deliberate strategy This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/…

US on Track For Record Number of Data Breaches

Latest quarterly figures show compromises at an all-time high This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US on Track For Record Number of Data Breaches

Chinese Threat Group Compromises US Government

Threat actors forged authentication tokens to access email This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese Threat Group Compromises US Government

Diplomats in Ukraine Targeted by “Staggering” BMW Phishing Campaign

Unit 42 researchers believe a Russian threat group repurposed a legitimate flyer for a BMW car sent to embassies in Kyiv, Ukraine This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Diplomats in Ukraine Targeted by “Staggering” BMW…

Ethical Hackers Reveal How They Use Generative AI

Bugcrowd’s report finds that many ethical hackers are utilizing generative AI in their work, but 72% argue it will never replace human creativity This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ethical Hackers Reveal How They Use…

Financial Industry Faces Soaring Ransomware Threat

Banks and financial service providers have emerged as attractive targets for the most prominent ransomware groups This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Financial Industry Faces Soaring Ransomware Threat

Scam Page Volumes Surge 304% Annually

Social media and messaging apps are main conduit This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Scam Page Volumes Surge 304% Annually

Microsoft Fixes Six Zero-Days This Patch Tuesday

One of the bugs has been actively exploited in NATO attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Fixes Six Zero-Days This Patch Tuesday

Clop: Behind MOVEit Lies a Loud, Adaptable and Persistent Threat Group

David Wallace, a senior threat intelligence analyst at Sophos, took a deep dive into Clop’s background and intrusion techniques This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clop: Behind MOVEit Lies a Loud, Adaptable and Persistent Threat…

11 Million Patients Impacted in Healthcare Data Breach

HCA Healthcare said personal data of approximately 11 million patients was published on an online forum This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: 11 Million Patients Impacted in Healthcare Data Breach

EU Adopts New US Data Privacy Agreement

The Commission’s announcement allows for the free flow of personal data between the two regions, but is likely to be challenged in the courts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: EU Adopts New US Data…

Moroccan Charged With OpenSea NFT and Crypto Theft

Individual allegedly used phishing website to harvest victim credentials This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Moroccan Charged With OpenSea NFT and Crypto Theft

Man Charged With Remote Attack on Water Plant

Individual accused of endangering health of Discovery Bay residents This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Man Charged With Remote Attack on Water Plant

E-commerce Fraud Surges By Over 50% Annually

Online merchants plan to increase budgets and new hires This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: E-commerce Fraud Surges By Over 50% Annually

RomCom Group Targets Ukraine Supporters Ahead of NATO Summit

The BlackBerry team suspects spear-phishing as the primary vector utilized by the RomCom group This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: RomCom Group Targets Ukraine Supporters Ahead of NATO Summit

Android OS Tools Fuel Cybercrime Spree, Prey on Digital Users

According to Resecurity, the trend poses challenges for online banking and payment systems This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Android OS Tools Fuel Cybercrime Spree, Prey on Digital Users

Martin Lewis Shocked at Deepfake Investment Scam Ad

Money-saving expert has sued Meta before over fake ads This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Martin Lewis Shocked at Deepfake Investment Scam Ad

Cyber Extortion Cases Surge 39% Annually

Action Fraud figures also reveal increase in social media hacking This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber Extortion Cases Surge 39% Annually

Chinese Spyware Discovered on Google Play Store

Each application sends the stolen data to China over a hundred times This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese Spyware Discovered on Google Play Store

Twitter User Exposes Nickelodeon Data Leak

Social media reports suggest an individual allegedly dumped approximately 500GB of animation files This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Twitter User Exposes Nickelodeon Data Leak

New Campaigns Use Malicious npm Packages to Support Phishing Kits

ReversingLabs discovered more than a dozen malicious npm packages between May 11 and June 13 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Campaigns Use Malicious npm Packages to Support Phishing Kits

US and Canadian Authorities Warn of Increased Truebot Activity

The joint advisory reveals that threat actors are leveraging new techniques to deliver the botnet This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US and Canadian Authorities Warn of Increased Truebot Activity

HSBC Joins Quantum-Secure Network

The banking giant is trialling the QKD-secured network as it seeks to future-proof its global operations against quantum-enabled cyber-threats This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: HSBC Joins Quantum-Secure Network

Ongoing Incident Prompts JumpCloud to Reset API Keys

To assist customers in the process, JumpCloud provided a guide for resetting affected API keys This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ongoing Incident Prompts JumpCloud to Reset API Keys

Cisco Enterprise Switch Flaw Exposes Encrypted Traffic

The vulnerability affects Cisco Nexus 9000 Series Fabric Switches This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cisco Enterprise Switch Flaw Exposes Encrypted Traffic

Unpatched SolarView Systems Vulnerable to Exploits

VulnCheck exposed the flaws, following a Palo Alto Networks’ Unit 42 publication This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Unpatched SolarView Systems Vulnerable to Exploits

Human Error the Leading Cause of Cloud Data Breaches

The report also found a significant rise in sensitive data being stored in the cloud and a continued surge in multicloud adoption This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Human Error the Leading Cause of Cloud…

Experts Warn of Impending TeamTNT Docker Attacks

Infrastructure being built to support new cloud-native campaign This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Experts Warn of Impending TeamTNT Docker Attacks

Police Arrest Suspected OPERAE1R Cybercrime Kingpin

Individual is thought to be key figure in $30m gang This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Police Arrest Suspected OPERAE1R Cybercrime Kingpin

Nagoya Port Faces Disruption After Ransomware Attack

Container import and export operations via trailer transportation have been temporarily halted This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Nagoya Port Faces Disruption After Ransomware Attack

High-Severity Flaws Fixed in Firefox 115 Update

One of them, CVE-2023-37201, involved a use-after-free issue in WebRTC certificate generation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: High-Severity Flaws Fixed in Firefox 115 Update

Sophisticated Email Attacks Target Cryptocurrency Wallets

Discovered by Kaspersky, the campaign delivered 85,000 scam emails during the spring of 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sophisticated Email Attacks Target Cryptocurrency Wallets

UK Citizens Wary of NHS AI Use, Citing Privacy Concerns

In a survey, over half of UK citizens expressed privacy and security concerns over AI being used to analyze patient data This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Citizens Wary of NHS AI Use, Citing…

European Commission to Tweak GDPR For Cross-Border Cases

Rules will streamline cooperation between data protection authorities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: European Commission to Tweak GDPR For Cross-Border Cases

Report Reveals Companies Unprepared For Darknet Data Leaks

Kaspersky said European firms were most frequently affected, accounting for 25% of notifications This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Report Reveals Companies Unprepared For Darknet Data Leaks

Over Two-Thirds of FortiGate Firewalls Still at Risk

Bishop Fox said they have successfully developed an exploit for the vulnerability This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Over Two-Thirds of FortiGate Firewalls Still at Risk

Mexican Hacker Unleashes Android Malware on Global Banks

Neo_Net’s campaign mainly targeted Spanish and Chilean financial institutions This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Mexican Hacker Unleashes Android Malware on Global Banks

OT Assets High Priority for Security Leaders as Industrial Threats Loom

A study by the SANS Institute and Trend Micro found major discrepancies between IT and OT asset visibility within organizations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: OT Assets High Priority for Security Leaders as Industrial…

Four Men Face 20 Years For Money Laundering Charges

They allegedly helped to clean money stolen from the elderly and vulnerable This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Four Men Face 20 Years For Money Laundering Charges

Microsoft Denies Major 30 Million Customer-Breach

Russian-linked Anonymous Sudan claims to have stolen credentials This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Denies Major 30 Million Customer-Breach

USPTO’s API Flaw Leads to Years-Long Data Leak

Around 61,000 addresses, accounting for 3% of total applications, were impacted during that period This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: USPTO’s API Flaw Leads to Years-Long Data Leak

Chinese Threat Actors Target Europe in SmugX Campaign

The attacks rely on novel delivery methods to deploy a variant of PlugX This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese Threat Actors Target Europe in SmugX Campaign

Meduza Stealer Targets Windows Users With Advanced Tactics

Uptycs discovered the new threat while monitoring dark web forums and Telegram channels This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Meduza Stealer Targets Windows Users With Advanced Tactics

TSMC Targeted by LockBit via Supplier Breach

The giant chip manufacturer’s supplier, Kinmax, admits to an attack against its internal specific testing environment This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: TSMC Targeted by LockBit via Supplier Breach

8Base Ransomware Group Emerges as Major Threat

VMware explained that 8Base employs a combination of encryption and “name-and-shame” tactics This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: 8Base Ransomware Group Emerges as Major Threat

LockBit Claims TSMC Hack, Demands $70m Ransom

If confirmed, it could be the fourth-largest ransom demand of all time This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: LockBit Claims TSMC Hack, Demands $70m Ransom

MITRE Announces Most Dangerous Software Weaknesses

CWE Top 25 list is calculated from two years of vulnerability data This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: MITRE Announces Most Dangerous Software Weaknesses

GCHQ Reveals Details of State-Backed Breach

Cyber-espionage incident occurred 20 years ago, says NCSC This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: GCHQ Reveals Details of State-Backed Breach

Amazon Issues Lawsuits Targeting Fake Review Brokers

E-commerce giant looks to improve customer trust in its marketplace This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Amazon Issues Lawsuits Targeting Fake Review Brokers

NSA and CISA Release Guidelines to Secure CI/CD Environments

The guidelines highlight three key threat scenarios and recommends mitigations for each This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NSA and CISA Release Guidelines to Secure CI/CD Environments

MIT Publishes Framework to Evaluate Cybersecurity Methods

It assesses information hackers could get from a victim program protected by an obfuscation scheme This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: MIT Publishes Framework to Evaluate Cybersecurity Methods