Tag: http://www.infosecurity-magazine.com/rss/news/76/application-security/

Financial Industry Faces Soaring Ransomware Threat

Banks and financial service providers have emerged as attractive targets for the most prominent ransomware groups This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Financial Industry Faces Soaring Ransomware Threat

Scam Page Volumes Surge 304% Annually

Social media and messaging apps are main conduit This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Scam Page Volumes Surge 304% Annually

Microsoft Fixes Six Zero-Days This Patch Tuesday

One of the bugs has been actively exploited in NATO attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Fixes Six Zero-Days This Patch Tuesday

Clop: Behind MOVEit Lies a Loud, Adaptable and Persistent Threat Group

David Wallace, a senior threat intelligence analyst at Sophos, took a deep dive into Clop’s background and intrusion techniques This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clop: Behind MOVEit Lies a Loud, Adaptable and Persistent Threat…

11 Million Patients Impacted in Healthcare Data Breach

HCA Healthcare said personal data of approximately 11 million patients was published on an online forum This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: 11 Million Patients Impacted in Healthcare Data Breach

EU Adopts New US Data Privacy Agreement

The Commission’s announcement allows for the free flow of personal data between the two regions, but is likely to be challenged in the courts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: EU Adopts New US Data…

Moroccan Charged With OpenSea NFT and Crypto Theft

Individual allegedly used phishing website to harvest victim credentials This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Moroccan Charged With OpenSea NFT and Crypto Theft

Man Charged With Remote Attack on Water Plant

Individual accused of endangering health of Discovery Bay residents This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Man Charged With Remote Attack on Water Plant

E-commerce Fraud Surges By Over 50% Annually

Online merchants plan to increase budgets and new hires This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: E-commerce Fraud Surges By Over 50% Annually

RomCom Group Targets Ukraine Supporters Ahead of NATO Summit

The BlackBerry team suspects spear-phishing as the primary vector utilized by the RomCom group This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: RomCom Group Targets Ukraine Supporters Ahead of NATO Summit

Android OS Tools Fuel Cybercrime Spree, Prey on Digital Users

According to Resecurity, the trend poses challenges for online banking and payment systems This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Android OS Tools Fuel Cybercrime Spree, Prey on Digital Users

Martin Lewis Shocked at Deepfake Investment Scam Ad

Money-saving expert has sued Meta before over fake ads This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Martin Lewis Shocked at Deepfake Investment Scam Ad

Cyber Extortion Cases Surge 39% Annually

Action Fraud figures also reveal increase in social media hacking This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber Extortion Cases Surge 39% Annually

Chinese Spyware Discovered on Google Play Store

Each application sends the stolen data to China over a hundred times This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese Spyware Discovered on Google Play Store

Twitter User Exposes Nickelodeon Data Leak

Social media reports suggest an individual allegedly dumped approximately 500GB of animation files This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Twitter User Exposes Nickelodeon Data Leak

New Campaigns Use Malicious npm Packages to Support Phishing Kits

ReversingLabs discovered more than a dozen malicious npm packages between May 11 and June 13 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Campaigns Use Malicious npm Packages to Support Phishing Kits

US and Canadian Authorities Warn of Increased Truebot Activity

The joint advisory reveals that threat actors are leveraging new techniques to deliver the botnet This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US and Canadian Authorities Warn of Increased Truebot Activity

HSBC Joins Quantum-Secure Network

The banking giant is trialling the QKD-secured network as it seeks to future-proof its global operations against quantum-enabled cyber-threats This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: HSBC Joins Quantum-Secure Network

Ongoing Incident Prompts JumpCloud to Reset API Keys

To assist customers in the process, JumpCloud provided a guide for resetting affected API keys This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ongoing Incident Prompts JumpCloud to Reset API Keys

Cisco Enterprise Switch Flaw Exposes Encrypted Traffic

The vulnerability affects Cisco Nexus 9000 Series Fabric Switches This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cisco Enterprise Switch Flaw Exposes Encrypted Traffic

Unpatched SolarView Systems Vulnerable to Exploits

VulnCheck exposed the flaws, following a Palo Alto Networks’ Unit 42 publication This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Unpatched SolarView Systems Vulnerable to Exploits

Human Error the Leading Cause of Cloud Data Breaches

The report also found a significant rise in sensitive data being stored in the cloud and a continued surge in multicloud adoption This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Human Error the Leading Cause of Cloud…

Experts Warn of Impending TeamTNT Docker Attacks

Infrastructure being built to support new cloud-native campaign This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Experts Warn of Impending TeamTNT Docker Attacks

Police Arrest Suspected OPERAE1R Cybercrime Kingpin

Individual is thought to be key figure in $30m gang This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Police Arrest Suspected OPERAE1R Cybercrime Kingpin

Nagoya Port Faces Disruption After Ransomware Attack

Container import and export operations via trailer transportation have been temporarily halted This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Nagoya Port Faces Disruption After Ransomware Attack

High-Severity Flaws Fixed in Firefox 115 Update

One of them, CVE-2023-37201, involved a use-after-free issue in WebRTC certificate generation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: High-Severity Flaws Fixed in Firefox 115 Update

Sophisticated Email Attacks Target Cryptocurrency Wallets

Discovered by Kaspersky, the campaign delivered 85,000 scam emails during the spring of 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Sophisticated Email Attacks Target Cryptocurrency Wallets

UK Citizens Wary of NHS AI Use, Citing Privacy Concerns

In a survey, over half of UK citizens expressed privacy and security concerns over AI being used to analyze patient data This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Citizens Wary of NHS AI Use, Citing…

European Commission to Tweak GDPR For Cross-Border Cases

Rules will streamline cooperation between data protection authorities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: European Commission to Tweak GDPR For Cross-Border Cases

Report Reveals Companies Unprepared For Darknet Data Leaks

Kaspersky said European firms were most frequently affected, accounting for 25% of notifications This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Report Reveals Companies Unprepared For Darknet Data Leaks

Over Two-Thirds of FortiGate Firewalls Still at Risk

Bishop Fox said they have successfully developed an exploit for the vulnerability This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Over Two-Thirds of FortiGate Firewalls Still at Risk

Mexican Hacker Unleashes Android Malware on Global Banks

Neo_Net’s campaign mainly targeted Spanish and Chilean financial institutions This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Mexican Hacker Unleashes Android Malware on Global Banks

OT Assets High Priority for Security Leaders as Industrial Threats Loom

A study by the SANS Institute and Trend Micro found major discrepancies between IT and OT asset visibility within organizations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: OT Assets High Priority for Security Leaders as Industrial…

Four Men Face 20 Years For Money Laundering Charges

They allegedly helped to clean money stolen from the elderly and vulnerable This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Four Men Face 20 Years For Money Laundering Charges

Microsoft Denies Major 30 Million Customer-Breach

Russian-linked Anonymous Sudan claims to have stolen credentials This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Denies Major 30 Million Customer-Breach

USPTO’s API Flaw Leads to Years-Long Data Leak

Around 61,000 addresses, accounting for 3% of total applications, were impacted during that period This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: USPTO’s API Flaw Leads to Years-Long Data Leak

Chinese Threat Actors Target Europe in SmugX Campaign

The attacks rely on novel delivery methods to deploy a variant of PlugX This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Chinese Threat Actors Target Europe in SmugX Campaign

Meduza Stealer Targets Windows Users With Advanced Tactics

Uptycs discovered the new threat while monitoring dark web forums and Telegram channels This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Meduza Stealer Targets Windows Users With Advanced Tactics

TSMC Targeted by LockBit via Supplier Breach

The giant chip manufacturer’s supplier, Kinmax, admits to an attack against its internal specific testing environment This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: TSMC Targeted by LockBit via Supplier Breach

8Base Ransomware Group Emerges as Major Threat

VMware explained that 8Base employs a combination of encryption and “name-and-shame” tactics This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: 8Base Ransomware Group Emerges as Major Threat

LockBit Claims TSMC Hack, Demands $70m Ransom

If confirmed, it could be the fourth-largest ransom demand of all time This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: LockBit Claims TSMC Hack, Demands $70m Ransom

MITRE Announces Most Dangerous Software Weaknesses

CWE Top 25 list is calculated from two years of vulnerability data This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: MITRE Announces Most Dangerous Software Weaknesses

GCHQ Reveals Details of State-Backed Breach

Cyber-espionage incident occurred 20 years ago, says NCSC This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: GCHQ Reveals Details of State-Backed Breach

Amazon Issues Lawsuits Targeting Fake Review Brokers

E-commerce giant looks to improve customer trust in its marketplace This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Amazon Issues Lawsuits Targeting Fake Review Brokers

NSA and CISA Release Guidelines to Secure CI/CD Environments

The guidelines highlight three key threat scenarios and recommends mitigations for each This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NSA and CISA Release Guidelines to Secure CI/CD Environments

MIT Publishes Framework to Evaluate Cybersecurity Methods

It assesses information hackers could get from a victim program protected by an obfuscation scheme This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: MIT Publishes Framework to Evaluate Cybersecurity Methods

LockBit Dominates Ransomware World, New Report Finds

LockBit becomes one of the first major ransomware operations to specifically target macOS This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: LockBit Dominates Ransomware World, New Report Finds

Japan in the Crosshairs of Many State-Sponsored Threat Actors New Report Finds

Rapid7 found that Vietnamese APTs have also been targeting Japanese organizations, especially competitors of Vietnam’s budding automotive industry This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Japan in the Crosshairs of Many State-Sponsored Threat Actors New Report…

Suncor Energy Responds to Cybersecurity Incident

Over 1500 Petro-Canada gas stations are unable to accept credit card payments This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Suncor Energy Responds to Cybersecurity Incident

ThirdEye Infostealer Poses New Threat to Windows Users

FortiGuard explained that ThirdEye can harvest BIOS and hardware data This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ThirdEye Infostealer Poses New Threat to Windows Users

Andariel’s Mistakes Uncover New Malware in Lazarus Group Campaign

Kaspersky analyzes the group’s tactics and reveals the emergence of a new threat called EarlyRat This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Andariel’s Mistakes Uncover New Malware in Lazarus Group Campaign

Mobile Malware and Phishing Surge in 2022

Zimperium records large increase in share of compromised devices This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Mobile Malware and Phishing Surge in 2022

EncroChat Bust Leads to 6500 Arrests in Three Years

Encrypted comms platform was used by organized criminals This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: EncroChat Bust Leads to 6500 Arrests in Three Years

Experts Unconvinced by Upskill in UK Cyber Program

Its 3600 applicants will barely make a dent in overall skills shortages This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Experts Unconvinced by Upskill in UK Cyber Program

Anatsa Banking Trojan Targets Banks in US, UK and DACH Region

ThreatFabric said the ongoing campaign started in March and has witnessed over 30,000 installations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Anatsa Banking Trojan Targets Banks in US, UK and DACH Region

Submarine Cables at Growing Risk of Cyber-Attacks

A report from Recorded Future highlights how digital cable management systems are vulnerable to nation-state attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Submarine Cables at Growing Risk of Cyber-Attacks

NCSC Launches Cyber Risk Management Toolbox

Security agency’s latest guidance refresh makes best practices more accessible This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCSC Launches Cyber Risk Management Toolbox

Are GPT-Based Models the Right Fit for AI-Powered Cybersecurity?

Many cybersecurity vendors are integrating general-purpose large language models into their solutions. However, some experts argue that these are not the best AI algorithms for security This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Are GPT-Based Models…

Umbral Stealer Discovered in Trojanized Super Mario Installer

The discovery comes from security researchers at Cyble Research and Intelligence Labs This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Umbral Stealer Discovered in Trojanized Super Mario Installer

Millions Face RepoJacking Risk on GitHub Repositories

Aqua identified numerous high-profile targets, including organizations such as Google and Lyft This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Millions Face RepoJacking Risk on GitHub Repositories

NSA Releases Guide to Mitigate BlackLotus Bootkit Infections

Microsoft patched exploited boot loader flaw but did not revoke trust in unpatched loaders This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NSA Releases Guide to Mitigate BlackLotus Bootkit Infections

US Authorities Seize BreachForums Domain

Questions still to be answered over why it took so long This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Authorities Seize BreachForums Domain

Twitter Celeb Hacker Jailed For Five Years

Joseph O’Connor hijacked over 100 accounts in bitcoin scam This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Twitter Celeb Hacker Jailed For Five Years

US Military Personnel Warned of Malicious Smartwatches

The smartwatches have Wi-Fi auto-connect features and possibly contain malware This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Military Personnel Warned of Malicious Smartwatches

OpenSSH Trojan Campaign Targets IoT and Linux Systems

Microsoft said attackers used a patched version of OpenSSH to gain control of compromised devices This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: OpenSSH Trojan Campaign Targets IoT and Linux Systems

USB Drives Used as Trojan Horses By Camaro Dragon

The malicious software tools were discovered by Check Point Research This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: USB Drives Used as Trojan Horses By Camaro Dragon

#InfosecurityEurope: Experts Highlight Evolving Attack Techniques

Experts discussed growing utilization of ChatGPT by threat actors and evolving identity-based attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #InfosecurityEurope: Experts Highlight Evolving Attack Techniques

Apple Addresses Exploited Security Flaws in iOS, macOS and Safari

Latest updates patch two zero-day vulnerabilities reportedly weaponized in Operation Triangulation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Apple Addresses Exploited Security Flaws in iOS, macOS and Safari

US Justice Department Launches New National Security Cyber Section

The primary objective of NatSec Cyber is to enhance the Justice Department’s capacity to counter malicious cyber activities effectively This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Justice Department Launches New National Security Cyber Section

RedEyes Group Targets Individuals with Wiretapping Malware

The campaign was discovered by AhnLab Security Emergency Response Center (ASEC) This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: RedEyes Group Targets Individuals with Wiretapping Malware