Tag: http://www.infosecurity-magazine.com/rss/news/76/application-security/

SpyNote Android Spyware Strikes Financial Institutions

Cleafy said the malware exploits Accessibility services to conduct multiple malicious activities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: SpyNote Android Spyware Strikes Financial Institutions

APT31 Implants Target Industrial Organizations

The attackers established a channel for data exfiltration, including from air-gapped systems This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: APT31 Implants Target Industrial Organizations

Biden Announces National Cyber Workforce and Education Strategy

The White House says that filling cyber job vacancies is a national security imperative This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Biden Announces National Cyber Workforce and Education Strategy

UK Military Embraces Security by Design

The initiative is designed to transform how cybersecurity is addressed in capability programs across the MoD This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Military Embraces Security by Design

Ongoing STARK#MULE Attack Campaign Discovered

The campaign appears directed at Korean-speaking victims, indicating an origin in North Korea This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ongoing STARK#MULE Attack Campaign Discovered

Global Lawyers Unveil Cyber Best Practices for Execs

International Bar Association offers practical policy recommendations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Global Lawyers Unveil Cyber Best Practices for Execs

Think Tank: Insurers Not Fuelling Ransomware Market

RUSI report makes recommendations for the industry This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Think Tank: Insurers Not Fuelling Ransomware Market

UK MoD Error Sends Emails to Russia’s Ally Instead of US

The MoD clarified that the incident involved fewer than 20 emails and none were top secret This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK MoD Error Sends Emails to Russia’s Ally Instead of US

New Study Reveals Forged Certificate Attack Risks

Attempts can lead to unauthorized access to important company resources This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Study Reveals Forged Certificate Attack Risks

40% of Ubuntu Cloud Workloads Vulnerable to Exploits

Wiz Research said the vulnerabilities were discovered in the Linux filesystem, OverlayFS This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: 40% of Ubuntu Cloud Workloads Vulnerable to Exploits

Microsoft Accused of Negligence in Recent Email Compromise

In an open letter, Senator Ron Wyden urged federal agencies to investigate Microsoft following a Chinese campaign that compromised US government emails This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Accused of Negligence in Recent Email…

Australia and US Issue Warning About Web App Threats

The advisory issues recommendations for developers and end users on reducing the prevalence of access control vulnerabilities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Australia and US Issue Warning About Web App Threats

SSNDOB Marketplace Admin Pleads Guilty

Site was used to trade stolen data This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: SSNDOB Marketplace Admin Pleads Guilty

MOVEit Campaign Claims Millions More Victims

US government services firm is latest to reveal compromise This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: MOVEit Campaign Claims Millions More Victims

Security Incident Impacts CardioComm’s Operations

Several of the company’s products are affected by the outage This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Security Incident Impacts CardioComm’s Operations

China’s Wuhan Earthquake Center Suffers Cyber-Attack

Responding to the news, a Chinese Foreign Ministry Spokesperson claimed the US is engaging in malicious cyber operations across the world This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: China’s Wuhan Earthquake Center Suffers Cyber-Attack

High Severity Vulnerabilities Discovered in Ninja Forms Plugin

The popular forms builder plugin for WordPress has over 900,000 active installations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: High Severity Vulnerabilities Discovered in Ninja Forms Plugin

“Mysterious Elephant” Emerges, Kaspersky Reports

Kaspersky also sheds light on more information related to the “Operation Triangulation” campaign This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: “Mysterious Elephant” Emerges, Kaspersky Reports

OpenAI, Microsoft, Google and Anthropic Form Body to Regulate AI

Four generative AI pioneers launched the Frontier Model Forum, which will focus on ‘safe and responsible’ creation of new AI models This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: OpenAI, Microsoft, Google and Anthropic Form Body to…

NCSC Publishes New Guidance on Shadow IT

Security agency suggests mitigations and technical solutions This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCSC Publishes New Guidance on Shadow IT

Supply Chain Attack Hits NHS Ambulance Trusts

Electronic patient records unavailable for over a week This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Supply Chain Attack Hits NHS Ambulance Trusts

SEC Wants Cyber-Incident Disclosure Within Four Days

More consistent notification rules required of public firms This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: SEC Wants Cyber-Incident Disclosure Within Four Days

Repeatable VEC Attacks Target Critical Infrastructure

Likelihood of a firm falling victim to a VEC attack rose from 45% in June 2022 to 70% in May 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Repeatable VEC Attacks Target Critical Infrastructure

VMware Patches Vulnerability Exposing Admin Credentials

The issue arises from the logging of credentials in hex encoding in platform system audit logs This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: VMware Patches Vulnerability Exposing Admin Credentials

Dark Web Markets Offer New FraudGPT AI Tool

The tool can craft phishing emails, create undetectable malware and identify vulnerable sites This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Dark Web Markets Offer New FraudGPT AI Tool

Ransomware Attacks Skyrocket in Q2 2023

SonicWall’s report finds that ransomware rebounded in Q2 2023 following a major reduction in Q1 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Attacks Skyrocket in Q2 2023

Education Sector Has Highest Ransomware Victim Count

Extortionists know their targets have low tolerance for outages This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Education Sector Has Highest Ransomware Victim Count

Decoy Dog Malware Upgraded to Include New Features

Decoy Dog used DNS for C2 and is suspected to be employed in ongoing nation-state cyber-attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Decoy Dog Malware Upgraded to Include New Features

North Korean Cyber Group Suspected in JumpCloud Breach

Mandiant said the compromise resulted from a sophisticated spear-phishing campaign This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: North Korean Cyber Group Suspected in JumpCloud Breach

Critical Flaws Found in Microsoft Message Queuing Service

FortiGuard Labs described the vulnerabilities in an advisory published on Monday This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Critical Flaws Found in Microsoft Message Queuing Service

UK Government Report Finds Cybersecurity Skills Gap Stagnant

A new report shows that 50% of all UK businesses have a basic cyber security skills gap, and 33% have an advanced skills gap This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Government Report Finds Cybersecurity…

Ivanti Patches Zero-Day Bug Used in Norway Attacks

CVSS 10.0 score means patch should be urgently deployed by customers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ivanti Patches Zero-Day Bug Used in Norway Attacks

Data Breach Costs Hit Record High but Fall For Some

IBM’s annual study finds over half of breached firms pass costs on This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Data Breach Costs Hit Record High but Fall For Some

Biden-Harris Administration Secures AI Commitments For Safety

Amazon, Anthropic, Google, Inflection, Meta, Microsoft and OpenAI all joined the initiative This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Biden-Harris Administration Secures AI Commitments For Safety

Cyber-Attack Strikes Norwegian Government Ministries

Erik Hope revealed the attack was traced back to a vulnerability in a government supplier This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-Attack Strikes Norwegian Government Ministries

Novel Open Source Supply Chain Attacks Target Banking Sector

Checkmarx has identified two distinct open-source software supply chain attacks targeting the financial sector for the first time This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Novel Open Source Supply Chain Attacks Target Banking Sector

Clop Could Make $100m from MOVEit Campaign

Coveware claims small number of victims paid very high ransoms This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clop Could Make $100m from MOVEit Campaign

US DoJ Announces Plan to Shakeup Cybercrime Investigations

In a speech, the DoJ’s Nicole M. Argentieri announced the merger of the NCET into the CCIPS This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US DoJ Announces Plan to Shakeup Cybercrime Investigations

Plurilock Launches Generative AI ‘Guardrails’ Product for Workforces

PromptGuard is a new cloud access security broker (CASB) that supports employee AI use while ensuring that sensitive data is not released to AI systems This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Plurilock Launches Generative AI…

Chinese Hackers Breached Ambassador’s Email

Storm-0558 attack was revealed last week This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese Hackers Breached Ambassador’s Email

Clop Drives Record Ransomware Activity in June

Scores of victims hit by MOVEit campaign This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clop Drives Record Ransomware Activity in June

GitHub Warns Devs of North Korean Attacks

Social engineering campaign designed to deliver malicious npm packages This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: GitHub Warns Devs of North Korean Attacks

New Study Highlights Critical Infrastructure’s Resilience

They exhibited a 20% higher threat detection behavior than the industry average This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Study Highlights Critical Infrastructure’s Resilience

Zyxel Vulnerability Exploited by DDoS Botnets on Linux Systems

Fortinet discovered Multiple DDoS botnets, including Dark.IoT, a variant based on Mirai This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Zyxel Vulnerability Exploited by DDoS Botnets on Linux Systems

CNI Firms: Climate Tech is Increasing Cyber Risk

UK’s critical infrastructure sector concerned over expanding attack surface This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CNI Firms: Climate Tech is Increasing Cyber Risk

Estee Lauder Breached by Two Ransomware Groups

Cosmetics giant confirms data was taken This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Estee Lauder Breached by Two Ransomware Groups

Chinese APT41 Linked to WyrmSpy and DragonEgg Surveillanceware

Lookout attributed WyrmSpy and DragonEgg to APT41 due to overlapping Android signing certificates This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese APT41 Linked to WyrmSpy and DragonEgg Surveillanceware

Critical API Security Gaps Found in Financial Services

The Salt Security report also notes a 244% surge in unique attackers between H1 and H2 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Critical API Security Gaps Found in Financial Services

Biden-Harris Administration Unveils Smart Device Cyber Program

The criteria for certification are set to be based on cybersecurity guidelines published by NIST This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Biden-Harris Administration Unveils Smart Device Cyber Program

Industry Experts Urge CISA to Update Secure by Design Guidance

A letter authored by industry experts says that CISA should include specific details on how to implement security-by-design through threat modeling This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Industry Experts Urge CISA to Update Secure by…

Scam Job Offers Target Uni Students

Threat actors exploit high cost of living This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Scam Job Offers Target Uni Students

New Vulnerabilities Found in Adobe ColdFusion

Rapid7 has observed that some vulnerabilities in Adobe ColdFusion were still being exploited several days after the patches were published This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Vulnerabilities Found in Adobe ColdFusion

CISA Unveils Guide to Aid Firms Transition to Cloud Security

It mentions the CSET, SCuBAGear, Untitled Goose Tool, Decider and Memory Forensic on Cloud This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Unveils Guide to Aid Firms Transition to Cloud Security

drIBAN Fraud Operations Target Corporate Banking Customers

The web injects allow cyber-criminals to manipulate legitimate web pages’ content in real time This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: drIBAN Fraud Operations Target Corporate Banking Customers

JumpCloud Confirms Data Breach By Nation-State Actor

The attack vector was identified as data injection into the firm’s commands framework This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: JumpCloud Confirms Data Breach By Nation-State Actor

IT Security Pro Jailed for Attempted Extortion

Hertfordshire man pleaded guilty in May This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: IT Security Pro Jailed for Attempted Extortion

BreachForums Admin Pleads Guilty to Hacking Charges

The guilty plea also covered a separate count of possession of child pornography This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: BreachForums Admin Pleads Guilty to Hacking Charges

Sorillus RAT and Phishing Attacks Exploit Google Firebase Hosting

eSentire found the threat after detecting suspicious code in a manufacturing customer’s network This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sorillus RAT and Phishing Attacks Exploit Google Firebase Hosting

EU Urged to Prepare for Quantum Cyber-Attacks

A discussion paper from the European Policy Centre sets out recommendations for an EU quantum cybersecurity agenda This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: EU Urged to Prepare for Quantum Cyber-Attacks

Acting White House Cyber Director Withdraws Nomination

Reports suggest personal debt behind Kemba Walden’s decision This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Acting White House Cyber Director Withdraws Nomination

New Threat Actor Launches Cyber-attacks on Ukraine and Poland

Cisco Talos said the malicious campaigns started in April 2022 and are currently ongoing This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Threat Actor Launches Cyber-attacks on Ukraine and Poland

LokiBot Malware Targets Windows Users in Office Document Attacks

Fortinet suggests attackers are leveraging vulnerabilities like CVE-2021-40444 and CVE-2022-30190 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: LokiBot Malware Targets Windows Users in Office Document Attacks

Chinese APT Favorite Backdoor Found in Pakistani Government App

Trend Micro found a backdoor previously exploited by various Chinese threat actors in a popular application used by Pakistan’s government agencies This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese APT Favorite Backdoor Found in Pakistani Government…

NCSC Shares Alternatives to Using a SOC

Security agency’s advice could help save time and money This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCSC Shares Alternatives to Using a SOC

New CVSS Version Unveiled Amid Rising Cyber Threats

FIRST has released details of version 4.0 of the standard, which aims to address criticisms of CVSS 3.1 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New CVSS Version Unveiled Amid Rising Cyber Threats

Mandiant Unveils Russian GRU’s Cyber Playbook Against Ukraine

Mandiant has observed that the same playbook has been used by various Russian threat actors since the breakout of war in Ukraine, making them likely to be part of a GRU-led deliberate strategy This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/…

US on Track For Record Number of Data Breaches

Latest quarterly figures show compromises at an all-time high This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US on Track For Record Number of Data Breaches

Chinese Threat Group Compromises US Government

Threat actors forged authentication tokens to access email This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese Threat Group Compromises US Government

Diplomats in Ukraine Targeted by “Staggering” BMW Phishing Campaign

Unit 42 researchers believe a Russian threat group repurposed a legitimate flyer for a BMW car sent to embassies in Kyiv, Ukraine This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Diplomats in Ukraine Targeted by “Staggering” BMW…

Ethical Hackers Reveal How They Use Generative AI

Bugcrowd’s report finds that many ethical hackers are utilizing generative AI in their work, but 72% argue it will never replace human creativity This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ethical Hackers Reveal How They Use…