Category: http://www.infosecurity-magazine.com/rss/news/76/application-security/

Montana Signs Ban on TikTok Usage on Personal Devices

A TikTok spokesperson said the ban violates the First Amendment rights of Montana residents This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Montana Signs Ban on TikTok Usage on Personal Devices

ChatGPT Leveraged to Enhance Software Supply Chain Security

OX-GPT is designed to help quickly remediate security vulnerabilities during software development This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ChatGPT Leveraged to Enhance Software Supply Chain Security

New Cloud Data Leak Adds to Capita’s Woes

Colchester council says multiple local authorities are impacted This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Cloud Data Leak Adds to Capita’s Woes

Identity Crimes Remain at All-Time High in 2022

Most reports related to Google Voice scams This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Identity Crimes Remain at All-Time High in 2022

Social Engineering Risks Found in Microsoft Teams

The abuse methods require pre-existing access to a compromised user account or Teams token This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Social Engineering Risks Found in Microsoft Teams

BatLoader Impersonates ChatGPT and Midjourney in Cyber-Attacks

eSentire recommended raising awareness of malware masquerading as legitimate applications This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: BatLoader Impersonates ChatGPT and Midjourney in Cyber-Attacks

Energy Industry Faces Increasing Dark Web Cyber Threats

The claims come from the latest Searchlight Cyber threat intelligence report This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Energy Industry Faces Increasing Dark Web Cyber Threats

Acronis Launches EDR Solution with Potential for AI Integration

Acronis EDR is integrated into its Cyber Protect Cloud solution along with backup and data recovery functionalities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Acronis Launches EDR Solution with Potential for AI Integration

Cyber-Resilience Programs Failing on Poor Visibility

Organizations need a better way to build and assess programs This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-Resilience Programs Failing on Poor Visibility

NSO Group Spends Millions Lobbying US Government

Spyware maker wants return to “business as usual” This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NSO Group Spends Millions Lobbying US Government

Camaro Dragon APT Group Exploits TP-Link Routers With Custom Implant

The implant’s components are designed to be compatible with different firmware from various vendors This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Camaro Dragon APT Group Exploits TP-Link Routers With Custom Implant

Lacroix Shuts Three Factories For a Week After Cyber-Attack

The targeted cyber-attack hit activity sites in France, Germany and Tunisia This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Lacroix Shuts Three Factories For a Week After Cyber-Attack

BEC Attackers Spoof CC’d Execs to Force Payment

Armorblox uncovers another new tactic used by email fraudsters This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: BEC Attackers Spoof CC’d Execs to Force Payment

Researchers Uncover New “RA Group” Ransomware

Actor is using leaked Babuk code to target firms This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Researchers Uncover New “RA Group” Ransomware

PharMerica Breach Hits Over 5.8 Million Customers

Medical and insurance data exposed in ransomware attack This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: PharMerica Breach Hits Over 5.8 Million Customers

Qilin’s Dark Web Ransomware Targets Critical Sectors

Group-IB’s threat intelligence team said it infiltrated and analyzed Qilin’s inner workings This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Qilin’s Dark Web Ransomware Targets Critical Sectors

Ex-Ubiquiti Employee Imprisoned For $2m Crypto Extortion Scheme

The defendant was also ordered to pay $1.6m in restitution and forfeit property used for the crimes This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ex-Ubiquiti Employee Imprisoned For $2m Crypto Extortion Scheme

Discord Breached After Service Agent Targeted

Incident impacts user emails and support messages This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Discord Breached After Service Agent Targeted

PaperCut Software Flaw Sparks Ransomware Attacks, CISA Warns

The bug allowed cyber-criminals to remotely execute malicious code without authentication credentials This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: PaperCut Software Flaw Sparks Ransomware Attacks, CISA Warns

Software Supply Chain Attacks Hit 61% of Firms

Only half of firms are requesting a software bill of materials This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Software Supply Chain Attacks Hit 61% of Firms

Card ‘ID Theft’ Fraud Doubles in 2022

UK Finance figures show growing online menace This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Card ‘ID Theft’ Fraud Doubles in 2022

Threat Actors Use Babuk Code to Build Hypervisor Ransomware

According to SentinelOne, these novel variants emerged between 2022 and 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Threat Actors Use Babuk Code to Build Hypervisor Ransomware

NCSC and ICO Dispel Incident Reporting Myths

Keeping attacks a secret only helps the criminals, they warn This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCSC and ICO Dispel Incident Reporting Myths

Ransomware Encryption Rates Reach New Heights

Overall, ransomware infections remain steady, Sophos maintains This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Encryption Rates Reach New Heights

Spanish Police Arrest 40 in Phishing Gang Bust

Organized crime ring used phishing to fund operation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Spanish Police Arrest 40 in Phishing Gang Bust

Microsoft Patches Three Zero-Day Bugs This Month

This month’s Patch Tuesday more manageable for sysadmins This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Patches Three Zero-Day Bugs This Month

ISACA: Companies Still Face Many Barriers to Achieving Digital Trust

While ISACA’s concept of digital trust is increasingly recognized as key to digital transformation, business leaders are still faced with many bottlenecks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ISACA: Companies Still Face Many Barriers to…

New Botnet Campaign Exploits Ruckus Wireless Flaw

Tracked CVE-2023-25717, the flaw was recently exploited by the AndoryuBot botnet, says Fortinet This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Botnet Campaign Exploits Ruckus Wireless Flaw

Only 39% of IT Security Decision-Makers See it As Business Enabler

The Delinea report also suggests 36% of them believe cybersecurity is only important for compliance This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Only 39% of IT Security Decision-Makers See it As Business Enabler

Operation Power Off: 13 More Booter Sites Seized

Four pleaded guilty to running DDoS-for-hire operations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Operation Power Off: 13 More Booter Sites Seized

Five Takeaways From the Russian Cyber-Attack on Viasat’s Satellites

The 2022 AcidRain wiper attack, which shut down satellite services for thousands of people in Ukraine and Western Europe, was extensively discussed during the CYSAT conference in Paris This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Five…

Dallas Police Department Compromised in Ransomware Attack

The attack took down essential services, including some 911 dispatch systems This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Dallas Police Department Compromised in Ransomware Attack

North Korean APT Kimsuky Launches Global Spear-Phishing Campaign

ReconShark is sent via emails containing OneDrive links leading to documents with malicious macros This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: North Korean APT Kimsuky Launches Global Spear-Phishing Campaign

Cyber Patrols Lead to Seizure of Stolen Artefacts

Items dating back thousands of years recovered in new crackdown This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber Patrols Lead to Seizure of Stolen Artefacts

Ransomware Actors Extort University Via Alert System

Innovative tactics turn up the heat on Bluefield University This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Actors Extort University Via Alert System

Meta Tackles Malware Posing as ChatGPT in Persistent Campaigns

Malware families detected and disrupted include Ducktail and the newly identified NodeStealer This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Meta Tackles Malware Posing as ChatGPT in Persistent Campaigns

Android Spyware BouldSpy Linked to Iranian Government

The mobile malware has been used by threat actors to target minority groups This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Android Spyware BouldSpy Linked to Iranian Government

Consumer Group Slams Bank App Fraud Failings

Which? wants banks to improve customer outreach and security This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Consumer Group Slams Bank App Fraud Failings

Malicious HTML Attachment Volumes Surge

File type remains the most dangerous in email-borne threats This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Malicious HTML Attachment Volumes Surge

CISA Advises FCC Covered List For Risk Management

Some of the companies included in the list are Huawei, ZTE, Dahua and China Unicom This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Advises FCC Covered List For Risk Management

Apple and Google Unveil Industry Specification For Unwanted Tracking

The new standard ensures that Bluetooth location-tracking can work with unauthorized tracking detection and alerts on iOS and Android This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Apple and Google Unveil Industry Specification For Unwanted Tracking

Dark Web Bust Leads to Arrest of 288 Suspects

Suspects used Monopoly Market to buy and sell drugs This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Dark Web Bust Leads to Arrest of 288 Suspects

Bitmarck Halts Operations Due to Cybersecurity Breach

Bitmarck does not believe customer data was impacted due to the breach This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Bitmarck Halts Operations Due to Cybersecurity Breach

South Korean Lures Used to Deploy ROKRAT Malware

This shift is not exclusive to ROKRAT but represents a larger trend that became popular in 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: South Korean Lures Used to Deploy ROKRAT Malware

Hackers Exploit High Severity Flaw in TBK DVR Camera System

Vulnerability derives from an error the camera experiences when handling a maliciously crafted HTTP cookie This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Hackers Exploit High Severity Flaw in TBK DVR Camera System

T-Mobile Reveals Second Breach of the Year

Telco giant says issue began in late February This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: T-Mobile Reveals Second Breach of the Year

Advanced Fee Fraud Surges by Over 600%

However, computer misuse remains unchanged from before the pandemic This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Advanced Fee Fraud Surges by Over 600%

Global Cyber Attacks Rise by 7% in Q1 2023

Check Point also said the education and research sector experienced the highest number of attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Global Cyber Attacks Rise by 7% in Q1 2023

Android Apps Fail to Protect User Data During Device Transfer

CloudSEK said that in some applications such as WhatsApp, attackers could also bypass 2FA This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Android Apps Fail to Protect User Data During Device Transfer

Google Bans 173,000 Bad Developers in 2022

Efforts were part of a Google Play fraud and malware crackdown This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google Bans 173,000 Bad Developers in 2022

#RSAC: Organizations Warned About the Latest Attack Techniques

A range of experts provide insights into new techniques being used by cyber-threat actors This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: Organizations Warned About the Latest Attack Techniques

Vietnamese Hackers Linked to ‘Malverposting’ Campaign

Security experts at Guardio Labs discussed the findings in a new blog post This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Vietnamese Hackers Linked to ‘Malverposting’ Campaign

RTM Locker Ransomware Targets Linux Architecture

Security researchers at Uptycs shared the findings in an advisory published on Wednesday This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: RTM Locker Ransomware Targets Linux Architecture

#RSAC: Securing Software Supply Chains Requires Outside-the-Box Thinking

At RSA, cybersecurity experts discussed the unique nature of software supply chain attacks and approaches to tackling this growing threat This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: Securing Software Supply Chains Requires Outside-the-Box Thinking

APT Groups Expand Reach to New Industries and Geographies

The findings come from Kaspersky’s latest APT trends report for the first quarter of 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: APT Groups Expand Reach to New Industries and Geographies

Google Goes After CryptBot Distributors

Info-stealing malware infected over 600,000 machines This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google Goes After CryptBot Distributors

#RSAC: ISACA’s New Ransomware Incident Checklist to Aid Cyber Pros

ISACA’s Rob Clyde tells Infosecurity about the role of the guidance as well as new findings about cyber insurance This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: ISACA’s New Ransomware Incident Checklist to Aid Cyber Pros

Critical Flaw Patched in VMware Workstation and Fusion

A malicious actor with local admin privileges could exploit the vulnerability to escape from the VM This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Critical Flaw Patched in VMware Workstation and Fusion