Tag: http://www.infosecurity-magazine.com/rss/news/76/application-security/

New BEC Tactics Enable Fake Asset Purchases

FBI warns of scammers using Net-30 and Net-60 terms This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New BEC Tactics Enable Fake Asset Purchases

Latitude Financial Admits Breach Impacted Millions

Over 14 million records stolen from consumer lender This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Latitude Financial Admits Breach Impacted Millions

CISA Unveils Ransomware Notification Initiative

Provides businesses with early warnings to evict threat actors before they can encrypt data This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Unveils Ransomware Notification Initiative

GitHub Updates Security Protocol For Operations Over SSH

The move reportedly did not stem from a compromise of GitHub systems or customer information This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: GitHub Updates Security Protocol For Operations Over SSH

IRS Phishing Emails Used to Distribute Emotet

Monster 500MB attachment hides a nasty surprise This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: IRS Phishing Emails Used to Distribute Emotet

Fifth of Execs Admit Security Flaws Cost Them New Biz

Business leaders still underestimate importance of security to growth This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Fifth of Execs Admit Security Flaws Cost Them New Biz

SharePoint Phishing Scam Targets 1600 Across US, Europe

Cyber-criminals used the scam to steal the credentials for various email accounts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: SharePoint Phishing Scam Targets 1600 Across US, Europe

UK Government Sets Out Vision for NHS Cybersecurity

Plans to boost cyber-resilience in the health service by 2030 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Government Sets Out Vision for NHS Cybersecurity

Irish Food Giant Dole Admits Employee Data Breach

Incident was linked to previously disclosed ransomware attack This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Irish Food Giant Dole Admits Employee Data Breach

BreachForums Shuts Down After Admin’s Arrest

The forum’s admin said the move might be temporary and that they will set up a new Telegram group This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: BreachForums Shuts Down After Admin’s Arrest

New Android Banking Trojan ‘Nexus’ Promoted As MaaS

Nexus offers overlay attacks and keylogging activities designed to steal victims’ credentials This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Android Banking Trojan ‘Nexus’ Promoted As MaaS

CISA and NSA Enhance Security Framework With New IAM Guide

Guidance includes best practices for identity governance, environmental hardening, SSO, MFA and IAM auditing This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA and NSA Enhance Security Framework With New IAM Guide

Security Researchers Spot $36m BEC Attack

Threat actors impersonated target company’s vendor This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Security Researchers Spot $36m BEC Attack

Just 1% of Dot-Org Domains Are Fully DMARC Protected

Organizations are failing with their anti-phishing measures This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Just 1% of Dot-Org Domains Are Fully DMARC Protected

CommonMagic Targets Entities in Russo-Ukrainian Conflict Zone

Administrative, agriculture and transportation firms targeted in Donetsk, Luhansk and Crimea This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CommonMagic Targets Entities in Russo-Ukrainian Conflict Zone

Hackers Use NuGet Packages to Target .NET Developers

JFrog said this is the first instance of packages with malicious code in NuGet This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Hackers Use NuGet Packages to Target .NET Developers

NCSC Launches Two New Tools for Small Businesses

Offerings are designed to improve security for millions of firms This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCSC Launches Two New Tools for Small Businesses

Ferrari Reveals Data Breach Ransom Attack

Carmaker says it didn’t pay its extorters This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ferrari Reveals Data Breach Ransom Attack

BreachForums Admin Arrested in New York

Conor Brian Fitzpatrick of Peekskill was apprehended last Wednesday following an FBI investigation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: BreachForums Admin Arrested in New York

UK Ransomware Incident Volumes Surge 17% in 2022

Jumpsec report identified Karakurt, Lockbit and Vice Society among groups responsible This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Ransomware Incident Volumes Surge 17% in 2022

Scam Robocalls Forecast to Cost $58bn This Year

Juniper Research says most of the pain will be felt in the US This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Scam Robocalls Forecast to Cost $58bn This Year

Telegram, WhatsApp Trojanized to Target Cryptocurrency Wallets

Most of these apps rely on clipper malware to steal the contents of the Android clipboard This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Telegram, WhatsApp Trojanized to Target Cryptocurrency Wallets

Google Exposes 18 Zero-Day Flaws in Samsung Exynos Chips

Four of these vulnerabilities enabled potential attackers to perform remote code execution This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google Exposes 18 Zero-Day Flaws in Samsung Exynos Chips

ICO Reprimands Metropolitan Police for Data Snafu

Negligence could have caused “significant damage” This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ICO Reprimands Metropolitan Police for Data Snafu

US Government IIS Server Breached via Telerik Software Flaw

The critical vulnerability allows remote code execution and was assigned a CVSS v3.1 score of 9.8 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Government IIS Server Breached via Telerik Software Flaw

NCSC Calms Fears Over ChatGPT Threat

Tool won’t democratize cybercrime, agency argues This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCSC Calms Fears Over ChatGPT Threat

BEC Volumes Double on Phishing Surge

Business email compromise overtakes ransomware This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: BEC Volumes Double on Phishing Surge

Tick APT Group Hacked East Asian DLP Software Firm

The hacker breached the DLP company’s internal update servers to deliver malware within its network This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Tick APT Group Hacked East Asian DLP Software Firm

Humans Still More Effective Than ChatGPT at Phishing

The research paper by HoxHunt analyzed 53,127 emails sent to users in over 100 countries This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Humans Still More Effective Than ChatGPT at Phishing

UK Bank Limits Crypto Payments to Smother Fraud

NatWest warns of “life-changing” customer losses This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Bank Limits Crypto Payments to Smother Fraud

Microsoft Patches Two Zero Days This Month

They include one likely exploited by Russian-linked threat actors This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Patches Two Zero Days This Month

YoroTrooper Espionage Campaigns Target CIS, EU Countries

The threat actors mainly targeted organizations across Azerbaijan, Tajikistan and Kyrgyzstan This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: YoroTrooper Espionage Campaigns Target CIS, EU Countries

DEV-1101 Updates Open Source Phishing Kit

The kit is written in NodeJS and has automated setup and detection evasion capabilities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: DEV-1101 Updates Open Source Phishing Kit

CISA Creates New Ransomware Vulnerability Warning Program

The Agency will warn critical infrastructure entities to enable mitigation before an incident This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Creates New Ransomware Vulnerability Warning Program

LA Housing Authority Suffers Year-Long Breach

LockBit ransomware group stole data and encrypted files This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: LA Housing Authority Suffers Year-Long Breach

UK Crypto Firm Loses $200m in Cyber-Attack

Euler Finance suffered “flash loan” attack This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Crypto Firm Loses $200m in Cyber-Attack

Infostealers Spread Via AI-Generated YouTube Videos

Infostealers observed to be delivered via these videos included Vidar, RedLine and Raccoon This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Infostealers Spread Via AI-Generated YouTube Videos

Unlocking the Benefits and Trade-Offs of Agentless Cloud Security

Agentless cloud security solutions were among the most talked-about topics during the Cloud & Cyber Security Expo, set in London on March 8-9, 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Unlocking the Benefits and Trade-Offs…

Final Three Sentenced in £70m Money Laundering Case

London-based group also illegally obtained COVID relief funds This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Final Three Sentenced in £70m Money Laundering Case

Hadoken Security Group Upgrades Xenomorph Mobile Malware

The trojan can now start specified applications, show push notifications, steal cookies and more This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Hadoken Security Group Upgrades Xenomorph Mobile Malware

IceFire Ransomware Targets Linux Enterprise Networks

The campaign leveraged the exploitation of a flaw in IBM’s Aspera Faspex file-sharing software This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: IceFire Ransomware Targets Linux Enterprise Networks

FBI Warns of Crypto-Stealing Play-to-Earn Games

Fake apps are latest scam designed to trick consumers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: FBI Warns of Crypto-Stealing Play-to-Earn Games

Global Cops Take Down NetWire RAT

Suspected website administrator arrested in Croatia This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Global Cops Take Down NetWire RAT

TikTok Initiates Project Clover Amid European Data Security Concerns

Social media giant TikTok has retaliated to European data security concerns with Project Clover and the announcement of two new data centers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: TikTok Initiates Project Clover Amid European Data…

House Members at Risk After Insurer Data Breach

Threat actor claims to have info on 170,000 victims This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: House Members at Risk After Insurer Data Breach

SYS01 Stealer Targets Critical Infrastructure With Google Ads

The campaign lured Facebook business accounts with Google ads and fake Facebook profiles This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: SYS01 Stealer Targets Critical Infrastructure With Google Ads

Government Claims New UK GDPR Will Save Firms Billions

Data Protection and Digital Information Bill designed to reduce paperwork This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Government Claims New UK GDPR Will Save Firms Billions

Cyber-Threat Detections Surge 55% in 2022

Trend Micro stops a record 146 billion discrete threats This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-Threat Detections Surge 55% in 2022

Sharp Panda Target Southeast Asia in Espionage Campaign Expansion

New campaign leverages a new version of the SoulSearcher loader and the Soul modular framework This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sharp Panda Target Southeast Asia in Espionage Campaign Expansion

Shein App Accessed Clipboard Data on Android Devices

The findings come from Microsoft, in an advisory published on Monday This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Shein App Accessed Clipboard Data on Android Devices

Ransomware Attack Against Barcelona Hospital Disrupts Operations

A Catalonia government statement attributed the attack to the threat actor known as RansomHouse This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Attack Against Barcelona Hospital Disrupts Operations

Russia’s Cyber Tactics in Ukraine Shift to Focus on Espionage

Russian state-backed hackers is shifting from disruption tactics, with the likes of wiper attacks, to cyber espionage This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russia’s Cyber Tactics in Ukraine Shift to Focus on Espionage

Just 10% of Firms Can Resolve Cloud Threats in an Hour

Tool bloat is making it harder to detect and contain attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Just 10% of Firms Can Resolve Cloud Threats in an Hour

Russian Disinformation Campaign Records High-Profile Individuals on Camera

Proofpoint has detailed a sophisticated disinformation campaign in which high-profile individuals are duped into embarrassing comments on video This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russian Disinformation Campaign Records High-Profile Individuals on Camera

EPA Calls For Cybersecurity Improvements in Public Water Systems

The memorandum highlights the need for states to include cybersecurity in periodic audits This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: EPA Calls For Cybersecurity Improvements in Public Water Systems

DoppelPaymer Ransomware Gang Members Busted in Germany, Ukraine

Police also seized electronic equipment and are currently performing forensic examinations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: DoppelPaymer Ransomware Gang Members Busted in Germany, Ukraine

City of Oakland Faces Major Data Leak

Information was stolen during recent ransomware attack This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: City of Oakland Faces Major Data Leak

FTC Proposes $7.8m Fine for BetterHelp

Online counseling service shared health data This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: FTC Proposes $7.8m Fine for BetterHelp

TPM 2.0 Library Vulnerabilities May Affect Billions of IoT Devices

The disclosed flaws occurred when handling malicious TPM 2.0 commands with encrypted parameters This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: TPM 2.0 Library Vulnerabilities May Affect Billions of IoT Devices