Category: www.infosecurity-magazine.com

New North Korean Hacking Group Identified by Microsoft

Moonstone Sleet is a newly observed threat group targeting companies for financial and cyber espionage objectives This article has been indexed from www.infosecurity-magazine.com Read the original article: New North Korean Hacking Group Identified by Microsoft

#Infosec2024: Decoding SentinelOne’s AI Threat Hunting Assistant

SentinelOne will present a threat-hunting demonstration during which a security analyst will compete against a non-technical person using its AI assistant This article has been indexed from www.infosecurity-magazine.com Read the original article: #Infosec2024: Decoding SentinelOne’s AI Threat Hunting Assistant

Courtroom Recording Software Vulnerable to Backdoor Attacks

Rapid7 warned that users of Justice AV Solutions (JAVS) Viewer v8.3.7 recording software are at high risk of stolen credentials and having malware installed This article has been indexed from www.infosecurity-magazine.com Read the original article: Courtroom Recording Software Vulnerable to…

#Infosec2024: What to Expect at Infosecurity Europe 2024

Get ready for Infosecurity Europe 2024 with these top five picks from Infosecurity Magazine to help you plan your visit This article has been indexed from www.infosecurity-magazine.com Read the original article: #Infosec2024: What to Expect at Infosecurity Europe 2024

Fake Pegasus Spyware Strains Populate Clear and Dark Web

Actors in the clear and dark web are distributing fake source codes of the Pegasus spyware for financial gain This article has been indexed from www.infosecurity-magazine.com Read the original article: Fake Pegasus Spyware Strains Populate Clear and Dark Web

Cybercriminals Exploit Cloud Storage For SMS Phishing Scams

According to Enea, these campaigns use cloud storage platforms to host malicious websites, sending links via SMS to bypass firewalls This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybercriminals Exploit Cloud Storage For SMS Phishing Scams

NVD Leaves Exploited Vulnerabilities Unchecked

Over half of CISA’s known exploited vulnerabilities disclosed since February 2024 have not yet been analyzed by NIST’s National Vulnerability Database This article has been indexed from www.infosecurity-magazine.com Read the original article: NVD Leaves Exploited Vulnerabilities Unchecked

National Records of Scotland Data Breached in NHS Cyber-Attack

National Records of Scotland said sensitive personal data it holds was part of information stolen and published online by ransomware attackers from NHS Dumfries and Galloway This article has been indexed from www.infosecurity-magazine.com Read the original article: National Records of…

UserPro Plugin Vulnerability Allows Account Takeover

The plugin is used by over 20,000 sites and enables users to create customizable community websites This article has been indexed from www.infosecurity-magazine.com Read the original article: UserPro Plugin Vulnerability Allows Account Takeover

Mastercard Doubles Speed of Fraud Detection with Generative AI

Mastercard said it is using generative AI-based predictive technology to double the speed at which it can detect potentially compromised cards This article has been indexed from www.infosecurity-magazine.com Read the original article: Mastercard Doubles Speed of Fraud Detection with Generative…

US Unveils $50M Program to Help Hospitals Patch Cybersecurity Gaps

The US government UPGRADE program aims to automate vulnerability management in hospital environments, ensuring minimum disruption to services This article has been indexed from www.infosecurity-magazine.com Read the original article: US Unveils $50M Program to Help Hospitals Patch Cybersecurity Gaps

Authorized Push Payment Fraud Cases Surge 12% Annually

UK Finance figures reveal romance, purchase and investment scams drove up authorised push payment fraud in 2023 This article has been indexed from www.infosecurity-magazine.com Read the original article: Authorized Push Payment Fraud Cases Surge 12% Annually

Ransomware and AI-Powered Hacks Drive Cyber Investment

The rise in ransomware and AI generated attacks has contributed to accelerate investment into cyber defenses, Infosecurity Europe found in a new study This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware and AI-Powered Hacks Drive Cyber…

Authorities Arrest $100m Incognito Drugs Market Suspect

US officials say the suspected owner of the prolific Incognito dark web drugs marketplace has been arrested This article has been indexed from www.infosecurity-magazine.com Read the original article: Authorities Arrest $100m Incognito Drugs Market Suspect

Critical Fluent Bit Bug Impacts All Major Cloud Platforms

A newly discovered flaw in open source utility Fluent Bit could enable widespread DoS, RCE and information leakage This article has been indexed from www.infosecurity-magazine.com Read the original article: Critical Fluent Bit Bug Impacts All Major Cloud Platforms

Network Outages Hit 59% of Multi-Site Businesses Monthly

A new report from Kaspersky also shows that 46% of businesses experience network problems between one and three times a month This article has been indexed from www.infosecurity-magazine.com Read the original article: Network Outages Hit 59% of Multi-Site Businesses Monthly

Patient Data at Risk in MediSecure Ransomware Attack

Electronic prescriptions provider MediSecure said the attack originated from a third-party vendor, and has impacted individuals’ personal and health information This article has been indexed from www.infosecurity-magazine.com Read the original article: Patient Data at Risk in MediSecure Ransomware Attack

UK Lags Europe on Exploited Vulnerability Remediation

UK organizations are less likely than their European peers to have known exploited bugs but take longer to fix them This article has been indexed from www.infosecurity-magazine.com Read the original article: UK Lags Europe on Exploited Vulnerability Remediation

PDF Exploitation Targets Foxit Reader Users

CPR said exploit builders in .NET and Python have been employed to deploy this malware This article has been indexed from www.infosecurity-magazine.com Read the original article: PDF Exploitation Targets Foxit Reader Users

Santander Customer Data Compromised Following Third-Party Breach

Santander has warned that customer and employee data has been breached following unauthorized access to a database held by a third-party provider This article has been indexed from www.infosecurity-magazine.com Read the original article: Santander Customer Data Compromised Following Third-Party Breach

Microsoft Fixes Three Zero-Days in May Patch Tuesday

Microsoft has released patches for three zero-day vulnerabilities including two actively exploited in the wild This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Fixes Three Zero-Days in May Patch Tuesday

Data Breaches in US Schools Exposed 37.6M Records

Comparitech said 2023 was a record year for breaches with 954 reported, up from 139 in 2022 and 783 in 2021 This article has been indexed from www.infosecurity-magazine.com Read the original article: Data Breaches in US Schools Exposed 37.6M Records

Ebury Botnet Operators Diversify with Financial and Crypto Theft

The 15-year-old Ebury botnet is more active than ever, as ESET found 400,000 Linux servers compromised for cryptocurrency theft and financial gain This article has been indexed from www.infosecurity-magazine.com Read the original article: Ebury Botnet Operators Diversify with Financial and…

44% of Cybersecurity Professionals Struggle with Regulatory Compliance

Infosecurity Europe research highlights significant challenges faced by organisations in staying up to speed with increasing compliance requirements This article has been indexed from www.infosecurity-magazine.com Read the original article: 44% of Cybersecurity Professionals Struggle with Regulatory Compliance

Hackers Use DNS Tunneling to Scan and Track Victims

Palo Alto Networks warns threat actors are using DNS tunneling techniques to probe for network vulnerabilities This article has been indexed from www.infosecurity-magazine.com Read the original article: Hackers Use DNS Tunneling to Scan and Track Victims

FCC Names and Shames First Robocall Threat Actor

In a first, the FCC has designated “Royal Tiger” as a malicious robocall threat group This article has been indexed from www.infosecurity-magazine.com Read the original article: FCC Names and Shames First Robocall Threat Actor

Critical Vulnerabilities in Cinterion Modems Exposed

The flaws include CVE-2023-47610, a security weaknesses within the modem’s SUPL message handlers This article has been indexed from www.infosecurity-magazine.com Read the original article: Critical Vulnerabilities in Cinterion Modems Exposed

Black Basta Ransomware Victim Count Tops 500

Affiliates of prolific Black Basta ransomware group have breached over 500 global organizations This article has been indexed from www.infosecurity-magazine.com Read the original article: Black Basta Ransomware Victim Count Tops 500

Threat Actor Claims Major Europol Data Breach

A threat actor known as IntelBroker claims to be selling confidential Europol data after a May breach This article has been indexed from www.infosecurity-magazine.com Read the original article: Threat Actor Claims Major Europol Data Breach

RSAC: Experts Highlight Novel Cyber Threats and Tactics

Well-funded cybercriminals are adopting more sophisticated techniques, creating a need for defenders to stay informed about the evolving threat landscape This article has been indexed from www.infosecurity-magazine.com Read the original article: RSAC: Experts Highlight Novel Cyber Threats and Tactics

Mobile Banking Malware Surges 32%

Afghanistan, Turkmenistan and Tajikistan victims experienced the highest share of banking Trojans This article has been indexed from www.infosecurity-magazine.com Read the original article: Mobile Banking Malware Surges 32%

Fake Online Stores Scam Over 850,000 Shoppers

Researchers discover 75,000+ domains hosting fraudulent e-commerce sites, in a campaign dubbed BogusBazaar This article has been indexed from www.infosecurity-magazine.com Read the original article: Fake Online Stores Scam Over 850,000 Shoppers

RSAC: Three Strategies to Boost Open-Source Security

Experts at the RSA Conference discussed how governments, the open-source community and end users can work together to drastically improve the security of open-source software This article has been indexed from www.infosecurity-magazine.com Read the original article: RSAC: Three Strategies to…

#RSAC: Three Strategies to Boost Open-Source Security

Experts at the RSA Conference discussed how governments, the open-source community and end users can work together to drastically improve the security of open-source software This article has been indexed from www.infosecurity-magazine.com Read the original article: #RSAC: Three Strategies to…

A Third of Tech CISOs Are Unhappy With Their Income

IANS Research data finds many tech CISOs are concerned about their compensation as salaries stagnate This article has been indexed from www.infosecurity-magazine.com Read the original article: A Third of Tech CISOs Are Unhappy With Their Income

MedStar Health and DocGo Reveal Data Breaches

MedStar Health and DocGo have become the latest US healthcare providers to announce cybersecurity incidents This article has been indexed from www.infosecurity-magazine.com Read the original article: MedStar Health and DocGo Reveal Data Breaches