Its authors are actively and rapidly developing it This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New WikiLoader Malware Goes to Extreme Lengths to Hide
Tag: http://www.infosecurity-magazine.com/rss/news/76/application-security/
SpyNote Android Spyware Strikes Financial Institutions
Cleafy said the malware exploits Accessibility services to conduct multiple malicious activities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: SpyNote Android Spyware Strikes Financial Institutions
APT31 Implants Target Industrial Organizations
The attackers established a channel for data exfiltration, including from air-gapped systems This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: APT31 Implants Target Industrial Organizations
Biden Announces National Cyber Workforce and Education Strategy
The White House says that filling cyber job vacancies is a national security imperative This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Biden Announces National Cyber Workforce and Education Strategy
UK Military Embraces Security by Design
The initiative is designed to transform how cybersecurity is addressed in capability programs across the MoD This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Military Embraces Security by Design
Ongoing STARK#MULE Attack Campaign Discovered
The campaign appears directed at Korean-speaking victims, indicating an origin in North Korea This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ongoing STARK#MULE Attack Campaign Discovered
Global Lawyers Unveil Cyber Best Practices for Execs
International Bar Association offers practical policy recommendations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Global Lawyers Unveil Cyber Best Practices for Execs
Think Tank: Insurers Not Fuelling Ransomware Market
RUSI report makes recommendations for the industry This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Think Tank: Insurers Not Fuelling Ransomware Market
CISA: New Submarine Backdoor Used in Barracuda Campaign
Chinese threat actor used malware in attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA: New Submarine Backdoor Used in Barracuda Campaign
Security Serious Unsung Heroes Awards 2023 Open for Nominations
Nominations are open for the eighth annual Security Serious Unsung Heroes Awards. This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Security Serious Unsung Heroes Awards 2023 Open for Nominations
UK MoD Error Sends Emails to Russia’s Ally Instead of US
The MoD clarified that the incident involved fewer than 20 emails and none were top secret This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK MoD Error Sends Emails to Russia’s Ally Instead of US
New Study Reveals Forged Certificate Attack Risks
Attempts can lead to unauthorized access to important company resources This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Study Reveals Forged Certificate Attack Risks
40% of Ubuntu Cloud Workloads Vulnerable to Exploits
Wiz Research said the vulnerabilities were discovered in the Linux filesystem, OverlayFS This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: 40% of Ubuntu Cloud Workloads Vulnerable to Exploits
Microsoft Accused of Negligence in Recent Email Compromise
In an open letter, Senator Ron Wyden urged federal agencies to investigate Microsoft following a Chinese campaign that compromised US government emails This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Accused of Negligence in Recent Email…
Australia and US Issue Warning About Web App Threats
The advisory issues recommendations for developers and end users on reducing the prevalence of access control vulnerabilities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Australia and US Issue Warning About Web App Threats
SSNDOB Marketplace Admin Pleads Guilty
Site was used to trade stolen data This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: SSNDOB Marketplace Admin Pleads Guilty
North Korean Hackers Bag Another $100m in Crypto Heists
Two new breaches traced back to prolific Lazarus group This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: North Korean Hackers Bag Another $100m in Crypto Heists
MOVEit Campaign Claims Millions More Victims
US government services firm is latest to reveal compromise This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: MOVEit Campaign Claims Millions More Victims
Security Incident Impacts CardioComm’s Operations
Several of the company’s products are affected by the outage This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Security Incident Impacts CardioComm’s Operations
China’s Wuhan Earthquake Center Suffers Cyber-Attack
Responding to the news, a Chinese Foreign Ministry Spokesperson claimed the US is engaging in malicious cyber operations across the world This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: China’s Wuhan Earthquake Center Suffers Cyber-Attack
High Severity Vulnerabilities Discovered in Ninja Forms Plugin
The popular forms builder plugin for WordPress has over 900,000 active installations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: High Severity Vulnerabilities Discovered in Ninja Forms Plugin
“Mysterious Elephant” Emerges, Kaspersky Reports
Kaspersky also sheds light on more information related to the “Operation Triangulation” campaign This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: “Mysterious Elephant” Emerges, Kaspersky Reports
OpenAI, Microsoft, Google and Anthropic Form Body to Regulate AI
Four generative AI pioneers launched the Frontier Model Forum, which will focus on ‘safe and responsible’ creation of new AI models This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: OpenAI, Microsoft, Google and Anthropic Form Body to…
NCSC Publishes New Guidance on Shadow IT
Security agency suggests mitigations and technical solutions This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCSC Publishes New Guidance on Shadow IT
Supply Chain Attack Hits NHS Ambulance Trusts
Electronic patient records unavailable for over a week This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Supply Chain Attack Hits NHS Ambulance Trusts
SEC Wants Cyber-Incident Disclosure Within Four Days
More consistent notification rules required of public firms This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: SEC Wants Cyber-Incident Disclosure Within Four Days
Repeatable VEC Attacks Target Critical Infrastructure
Likelihood of a firm falling victim to a VEC attack rose from 45% in June 2022 to 70% in May 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Repeatable VEC Attacks Target Critical Infrastructure
VMware Patches Vulnerability Exposing Admin Credentials
The issue arises from the logging of credentials in hex encoding in platform system audit logs This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: VMware Patches Vulnerability Exposing Admin Credentials
Group-IB Founder Sentenced in Russia to 14 Years for Treason
Reports said Ilya Sachkov was suspected of passing on state secrets This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Group-IB Founder Sentenced in Russia to 14 Years for Treason
Dark Web Markets Offer New FraudGPT AI Tool
The tool can craft phishing emails, create undetectable malware and identify vulnerable sites This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Dark Web Markets Offer New FraudGPT AI Tool
Ransomware Attacks Skyrocket in Q2 2023
SonicWall’s report finds that ransomware rebounded in Q2 2023 following a major reduction in Q1 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Attacks Skyrocket in Q2 2023
Education Sector Has Highest Ransomware Victim Count
Extortionists know their targets have low tolerance for outages This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Education Sector Has Highest Ransomware Victim Count
Over 900,000 MikroTik Routers Exposed to Critical Bug
Attackers could covertly gain remote control of devices This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Over 900,000 MikroTik Routers Exposed to Critical Bug
Industry Coalition Calls For Enhanced Network Resilience
Alliance wants to improve visibility and patching This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Industry Coalition Calls For Enhanced Network Resilience
Decoy Dog Malware Upgraded to Include New Features
Decoy Dog used DNS for C2 and is suspected to be employed in ongoing nation-state cyber-attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Decoy Dog Malware Upgraded to Include New Features
North Korean Cyber Group Suspected in JumpCloud Breach
Mandiant said the compromise resulted from a sophisticated spear-phishing campaign This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: North Korean Cyber Group Suspected in JumpCloud Breach
Critical Flaws Found in Microsoft Message Queuing Service
FortiGuard Labs described the vulnerabilities in an advisory published on Monday This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Critical Flaws Found in Microsoft Message Queuing Service
UK Government Report Finds Cybersecurity Skills Gap Stagnant
A new report shows that 50% of all UK businesses have a basic cyber security skills gap, and 33% have an advanced skills gap This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Government Report Finds Cybersecurity…
Hacker Claims to Have Stolen Sensitive Medical Records from Egypt’s Ministry of Health
SOCRAdar and Falcon Feeds reported that the threat actor allegedly started selling the dataset This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Hacker Claims to Have Stolen Sensitive Medical Records from Egypt’s Ministry of Health
Aussie Government Exposed Personal Info Via Security Report
Survey participants had details published on parliament website This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Aussie Government Exposed Personal Info Via Security Report
Ivanti Patches Zero-Day Bug Used in Norway Attacks
CVSS 10.0 score means patch should be urgently deployed by customers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ivanti Patches Zero-Day Bug Used in Norway Attacks
Data Breach Costs Hit Record High but Fall For Some
IBM’s annual study finds over half of breached firms pass costs on This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Data Breach Costs Hit Record High but Fall For Some
Tampa General Hospital Data Breach Impacts 1.2 Million Patients
TGH said it first detected unusual activity on its computer systems on May 31 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Tampa General Hospital Data Breach Impacts 1.2 Million Patients
Biden-Harris Administration Secures AI Commitments For Safety
Amazon, Anthropic, Google, Inflection, Meta, Microsoft and OpenAI all joined the initiative This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Biden-Harris Administration Secures AI Commitments For Safety
Cyber-Attack Strikes Norwegian Government Ministries
Erik Hope revealed the attack was traced back to a vulnerability in a government supplier This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-Attack Strikes Norwegian Government Ministries
Novel Open Source Supply Chain Attacks Target Banking Sector
Checkmarx has identified two distinct open-source software supply chain attacks targeting the financial sector for the first time This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Novel Open Source Supply Chain Attacks Target Banking Sector
Booz Allen Pays $377m to Settle Government Fraud Case
Contractor was accused of violating False Claims Act This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Booz Allen Pays $377m to Settle Government Fraud Case
Thousands of Citrix Servers Exposed to Zero-Day Bug
Remote code execution attacks are ongoing This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Thousands of Citrix Servers Exposed to Zero-Day Bug
Clop Could Make $100m from MOVEit Campaign
Coveware claims small number of victims paid very high ransoms This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clop Could Make $100m from MOVEit Campaign
US DoJ Announces Plan to Shakeup Cybercrime Investigations
In a speech, the DoJ’s Nicole M. Argentieri announced the merger of the NCET into the CCIPS This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US DoJ Announces Plan to Shakeup Cybercrime Investigations
Plurilock Launches Generative AI ‘Guardrails’ Product for Workforces
PromptGuard is a new cloud access security broker (CASB) that supports employee AI use while ensuring that sensitive data is not released to AI systems This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Plurilock Launches Generative AI…
Russian Prosecutor Asks for 18 Years in Jail for Group-IB Founder
Ilya Sachkov, the founder of cybersecurity provider Group-IB, is accused of state treason This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russian Prosecutor Asks for 18 Years in Jail for Group-IB Founder
Chinese Hackers Breached Ambassador’s Email
Storm-0558 attack was revealed last week This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese Hackers Breached Ambassador’s Email
Chinese Hackers Breached Ambassador’s Email – Report
Storm-0558 attack was revealed last week This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese Hackers Breached Ambassador’s Email – Report
Clop Drives Record Ransomware Activity in June
Scores of victims hit by MOVEit campaign This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clop Drives Record Ransomware Activity in June
GitHub Warns Devs of North Korean Attacks
Social engineering campaign designed to deliver malicious npm packages This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: GitHub Warns Devs of North Korean Attacks
New Study Highlights Critical Infrastructure’s Resilience
They exhibited a 20% higher threat detection behavior than the industry average This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Study Highlights Critical Infrastructure’s Resilience
Microsoft Strengthens Cloud Logging Against Nation-State Threats
The company said they collaborated closely with CISA to expand cloud logging This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Strengthens Cloud Logging Against Nation-State Threats
Zyxel Vulnerability Exploited by DDoS Botnets on Linux Systems
Fortinet discovered Multiple DDoS botnets, including Dark.IoT, a variant based on Mirai This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Zyxel Vulnerability Exploited by DDoS Botnets on Linux Systems
Old Roblox Data Leak Resurfaces, 4000 Users’ Personal Information Exposed
Malicious actors have recently used an allegedly old data leak affecting Roblox developers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Old Roblox Data Leak Resurfaces, 4000 Users’ Personal Information Exposed
Half of AI Open Source Projects Reference Buggy Packages
Study also finds LLMs are poor at detecting malicious code This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Half of AI Open Source Projects Reference Buggy Packages
CNI Firms: Climate Tech is Increasing Cyber Risk
UK’s critical infrastructure sector concerned over expanding attack surface This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CNI Firms: Climate Tech is Increasing Cyber Risk
Estee Lauder Breached by Two Ransomware Groups
Cosmetics giant confirms data was taken This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Estee Lauder Breached by Two Ransomware Groups
Chinese APT41 Linked to WyrmSpy and DragonEgg Surveillanceware
Lookout attributed WyrmSpy and DragonEgg to APT41 due to overlapping Android signing certificates This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese APT41 Linked to WyrmSpy and DragonEgg Surveillanceware
Critical API Security Gaps Found in Financial Services
The Salt Security report also notes a 244% surge in unique attackers between H1 and H2 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Critical API Security Gaps Found in Financial Services
How Cyber Threat Intelligence Practitioners Should Leverage Automation and AI
The Cyber Threat Intelligence Summit discussed how automation and generative AI could help CTI practitioners tackle the overload of data they have to process This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: How Cyber Threat Intelligence Practitioners…
Biden-Harris Administration Unveils Smart Device Cyber Program
The criteria for certification are set to be based on cybersecurity guidelines published by NIST This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Biden-Harris Administration Unveils Smart Device Cyber Program
Industry Experts Urge CISA to Update Secure by Design Guidance
A letter authored by industry experts says that CISA should include specific details on how to implement security-by-design through threat modeling This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Industry Experts Urge CISA to Update Secure by…
Scam Job Offers Target Uni Students
Threat actors exploit high cost of living This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Scam Job Offers Target Uni Students
NCA: Nation States Using Cybercrime Groups as Proxies
Crime agency chief warns of surging online threat This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCA: Nation States Using Cybercrime Groups as Proxies
Norwegian Giant Tomra Suffers “Extensive” Attack
Employees forced to work from home after IT outage This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Norwegian Giant Tomra Suffers “Extensive” Attack
New Vulnerabilities Found in Adobe ColdFusion
Rapid7 has observed that some vulnerabilities in Adobe ColdFusion were still being exploited several days after the patches were published This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Vulnerabilities Found in Adobe ColdFusion
CISA Unveils Guide to Aid Firms Transition to Cloud Security
It mentions the CSET, SCuBAGear, Untitled Goose Tool, Decider and Memory Forensic on Cloud This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Unveils Guide to Aid Firms Transition to Cloud Security
drIBAN Fraud Operations Target Corporate Banking Customers
The web injects allow cyber-criminals to manipulate legitimate web pages’ content in real time This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: drIBAN Fraud Operations Target Corporate Banking Customers
JumpCloud Confirms Data Breach By Nation-State Actor
The attack vector was identified as data injection into the firm’s commands framework This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: JumpCloud Confirms Data Breach By Nation-State Actor
Suspected Scareware Fraudster Arrested After Decade on the Run
Ukrainian said to have caused victim losses of $70m This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Suspected Scareware Fraudster Arrested After Decade on the Run
WooCommerce Bug Exploited in Targeted WordPress Attacks
Wordfence claims over 157,000 sites have been hit so far This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: WooCommerce Bug Exploited in Targeted WordPress Attacks
IT Security Pro Jailed for Attempted Extortion
Hertfordshire man pleaded guilty in May This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: IT Security Pro Jailed for Attempted Extortion
BreachForums Admin Pleads Guilty to Hacking Charges
The guilty plea also covered a separate count of possession of child pornography This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: BreachForums Admin Pleads Guilty to Hacking Charges
Ukraine’s CERT-UA Exposes Gamaredon’s Rapid Data Theft Methods
The group utilize malware like GAMMASTEEL to rapidly exfiltrate files within 30-50 minutes This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ukraine’s CERT-UA Exposes Gamaredon’s Rapid Data Theft Methods
Sorillus RAT and Phishing Attacks Exploit Google Firebase Hosting
eSentire found the threat after detecting suspicious code in a manufacturing customer’s network This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sorillus RAT and Phishing Attacks Exploit Google Firebase Hosting
EU Urged to Prepare for Quantum Cyber-Attacks
A discussion paper from the European Policy Centre sets out recommendations for an EU quantum cybersecurity agenda This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: EU Urged to Prepare for Quantum Cyber-Attacks
Russian Charged with Tech Smuggling and Money Laundering
Man accused of aiding the Kremlin with dual-use tech This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Russian Charged with Tech Smuggling and Money Laundering
Health Tech Vendor to Pay $31m After Kickback Allegations
NextGen Healthcare was accused of violating False Claims Act This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Health Tech Vendor to Pay $31m After Kickback Allegations
Acting White House Cyber Director Withdraws Nomination
Reports suggest personal debt behind Kemba Walden’s decision This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Acting White House Cyber Director Withdraws Nomination
AI Tool WormGPT Enables Convincing Fake Emails For BEC Attacks
Security expert Daniel Kelley worked with the SlashNext team on the research This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: AI Tool WormGPT Enables Convincing Fake Emails For BEC Attacks
New Threat Actor Launches Cyber-attacks on Ukraine and Poland
Cisco Talos said the malicious campaigns started in April 2022 and are currently ongoing This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Threat Actor Launches Cyber-attacks on Ukraine and Poland
LokiBot Malware Targets Windows Users in Office Document Attacks
Fortinet suggests attackers are leveraging vulnerabilities like CVE-2021-40444 and CVE-2022-30190 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: LokiBot Malware Targets Windows Users in Office Document Attacks
Chinese APT Favorite Backdoor Found in Pakistani Government App
Trend Micro found a backdoor previously exploited by various Chinese threat actors in a popular application used by Pakistan’s government agencies This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese APT Favorite Backdoor Found in Pakistani Government…
NCSC Shares Alternatives to Using a SOC
Security agency’s advice could help save time and money This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCSC Shares Alternatives to Using a SOC
Ransomware Costs Financial Services $32bn in Five Years
The figure accounts for losses due to downtime alone This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Costs Financial Services $32bn in Five Years
UK Financial Regulator Urges Banks to Tackle AI-Based Fraud
Prime Minister wants UK to be a global center of AI regulation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Financial Regulator Urges Banks to Tackle AI-Based Fraud
New CVSS Version Unveiled Amid Rising Cyber Threats
FIRST has released details of version 4.0 of the standard, which aims to address criticisms of CVSS 3.1 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New CVSS Version Unveiled Amid Rising Cyber Threats
Mandiant Unveils Russian GRU’s Cyber Playbook Against Ukraine
Mandiant has observed that the same playbook has been used by various Russian threat actors since the breakout of war in Ukraine, making them likely to be part of a GRU-led deliberate strategy This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/…
White House Publishes Plan to Implement US National Cybersecurity Strategy
The plan details over 65 federal initiatives, each of which is assigned to a responsible agency This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: White House Publishes Plan to Implement US National Cybersecurity Strategy
US on Track For Record Number of Data Breaches
Latest quarterly figures show compromises at an all-time high This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US on Track For Record Number of Data Breaches
Fewer Than 100 Scammers Responsible For Global Email Extortion
Barracuda research lifts the lid on widespread threat activity This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Fewer Than 100 Scammers Responsible For Global Email Extortion
Chinese Threat Group Compromises US Government
Threat actors forged authentication tokens to access email This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese Threat Group Compromises US Government
Diplomats in Ukraine Targeted by “Staggering” BMW Phishing Campaign
Unit 42 researchers believe a Russian threat group repurposed a legitimate flyer for a BMW car sent to embassies in Kyiv, Ukraine This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Diplomats in Ukraine Targeted by “Staggering” BMW…
Ethical Hackers Reveal How They Use Generative AI
Bugcrowd’s report finds that many ethical hackers are utilizing generative AI in their work, but 72% argue it will never replace human creativity This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ethical Hackers Reveal How They Use…