Tag: http://www.infosecurity-magazine.com/rss/news/76/application-security/

UK Closes CCP Cyber Certification Scheme

Certified Cyber Professional will be replaced by new chartered scheme This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Closes CCP Cyber Certification Scheme

US and Korean Agencies Issue Warning on North Korean Cyber-Attacks

The advisory identifies several actors: Kimsuky, Thallium, APT43, Velvet Chollima and Black Banshee This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US and Korean Agencies Issue Warning on North Korean Cyber-Attacks

Horabot Campaign Targets Spanish-Speaking Users in the Americas

Cisco Talos said the threat actor behind the campaign is believed to be located in Brazil This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Horabot Campaign Targets Spanish-Speaking Users in the Americas

Potential Backdoor in Gigabyte PCs Exposes Supply Chain Risks

Eclypsium is working closely with Gigabyte to rectify insecure implementation of its app center This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Potential Backdoor in Gigabyte PCs Exposes Supply Chain Risks

HMRC in New Tax Credits Scam Warning

Claimants bombarded by phishing emails, phone calls and texts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: HMRC in New Tax Credits Scam Warning

Zyxel Customers Urged to Patch Exploited Bug

Vulnerability being “widely exploited” in Mirai-based botnet attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Zyxel Customers Urged to Patch Exploited Bug

SpinOk Trojan Compromises 421 Million Android Devices

The Doctor Web team unveiled information about the malware in an advisory published on Monday This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: SpinOk Trojan Compromises 421 Million Android Devices

WordPress Rushes Out Jetpack Patch to Millions

Bug could allow malicious actors to manipulate files This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: WordPress Rushes Out Jetpack Patch to Millions

Human Error Fuels Industrial APT Attacks, Kaspersky Reports

OT network admins grant access to employees or contractors without sufficient security measures This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Human Error Fuels Industrial APT Attacks, Kaspersky Reports

Ransomware Gangs Adopting Business-like Practices to Boost Profits

Cyber-criminal gangs are mirroring the practices of legitimate businesses to drive efficiencies and increase profits This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Gangs Adopting Business-like Practices to Boost Profits

Dark Web Data Leak Exposes RaidForums Members

Cybercrime site was taken down by the authorities in 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Dark Web Data Leak Exposes RaidForums Members

Nine Million MCNA Dental Customers Hit by Breach

LockBit ransomware group has claimed responsibility This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Nine Million MCNA Dental Customers Hit by Breach

New Mirai Variant Campaigns are Targeting IoT Devices

Unit 42 researchers observed that a wave of malicious campaigns, all deployed by the same threat actor, have been using IZ1H9 since November 2021 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Mirai Variant Campaigns are…

New Russian-Linked Malware Poses “Immediate Threat” to Energy Grids

Researchers say the specialized OT malware has similarities with Industroyer, which was used to take down power in Kiev, Ukraine, in 2016 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Russian-Linked Malware Poses “Immediate Threat” to…

Romania’s Safetech Leans into UK Cybersecurity Market

The cyber innovator sees the UK is an ideal location to realize its global ambitions as it opens a SOC at the Plexal Innovation Hub This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Romania’s Safetech Leans into…

Advanced Phishing Attacks Surge 356% in 2022

Perception Point said the increase is due to the adoption of new cloud collaboration apps This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Advanced Phishing Attacks Surge 356% in 2022

Expo Framework API Flaw Reveals User Data in Online Services

The vulnerability was discovered by Salt Security and has a CVSS score of 9.6 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Expo Framework API Flaw Reveals User Data in Online Services

AI Used to Create Malware, WithSecure Observes

The cybersecurity firm confirms that it has observed AI being used to generate malware This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: AI Used to Create Malware, WithSecure Observes

Lazarus Group Targeting Microsoft Web Servers to Launch Espionage Malware

Researchers detail the DLL side-loading technique used to deploy malware that facilitates credential theft and lateral movement This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Lazarus Group Targeting Microsoft Web Servers to Launch Espionage Malware

Backup Repositories Targeted in 93% of Ransomware Attacks

Organizations now acknowledge that having clean and recoverable backups is a critical element of a good business continuity plan This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Backup Repositories Targeted in 93% of Ransomware Attacks

Google Unveils Bug Bounty Program For Android Apps

Rewards range from $750 for certain MiTM scenarios to $30,000 for some ACE vulnerabilities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google Unveils Bug Bounty Program For Android Apps

ESET: Android App ‘iRecorder – Screen Recorder’ Trojanized with AhRat

With over 50,000 downloads, the screen recording app was initially legitimate, but the malicious functionality was later implemented This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ESET: Android App ‘iRecorder – Screen Recorder’ Trojanized with AhRat

Two-Thirds of IT Leaders Say GDPR Has Reduced Consumer Trust

Increased awareness of data privacy issues has reduced trust in organizations, according to the survey This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Two-Thirds of IT Leaders Say GDPR Has Reduced Consumer Trust

China Issues Ban on US Chipmaker Products

The Chinese Communist Party has told tech operators in China to stop purchasing Micron products This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: China Issues Ban on US Chipmaker Products

Meta Fined €1.2bn for Violating GDPR

The record-breaking amount of the fine is the least important part of the story, privacy experts argued This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Meta Fined €1.2bn for Violating GDPR

UK Man Sentenced to 13 Years for Running Multi-Million Fraud Website

Confirmed global losses from iSpoof scams were £100m, with the actual figure believed to be far higher This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Man Sentenced to 13 Years for Running Multi-Million Fraud Website

Microsoft Warns of Increase in Business Email Compromise Attacks

The company’s systems currently detect and investigate an average of 156,000 BEC attacks daily This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Warns of Increase in Business Email Compromise Attacks

KeePass Flaw Exposes Master Passwords

The vulnerability (CVE-2023-32784) was discovered by security researcher Dominik Reichl This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: KeePass Flaw Exposes Master Passwords

CommonMagic Malware Implants Linked to New CloudWizard Framework

Kaspersky researchers said sections of the CloudWizard code were identical to CommonMagic This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CommonMagic Malware Implants Linked to New CloudWizard Framework

Experts Warn of Voice Cloning-as-a-Service

Dark web offerings could commoditize deep fake technology This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Experts Warn of Voice Cloning-as-a-Service

Teen Charged in DraftKings Credential Stuffing Case

Wisconsin man alleged to have stolen $600,000 from accounts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Teen Charged in DraftKings Credential Stuffing Case

Apple’s App Store Blocks $2bn in Fraudulent Transactions

Firm also rejected 1.7 million apps for failing to meet privacy, security and content standards This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Apple’s App Store Blocks $2bn in Fraudulent Transactions

Cyber Warfare Escalates Amid China-Taiwan Tensions

Trellix report observed a surge in malicious emails targeting Taiwanese industries and government officials This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber Warfare Escalates Amid China-Taiwan Tensions

Apple’s App Store Blocks $2b in Fraudulent Transactions

Firm also rejected 1.7 million apps for failing to meet privacy, security and content standards This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Apple’s App Store Blocks $2b in Fraudulent Transactions

Montana Signs Ban on TikTok Usage on Personal Devices

A TikTok spokesperson said the ban violates the First Amendment rights of Montana residents This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Montana Signs Ban on TikTok Usage on Personal Devices

ChatGPT Leveraged to Enhance Software Supply Chain Security

OX-GPT is designed to help quickly remediate security vulnerabilities during software development This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ChatGPT Leveraged to Enhance Software Supply Chain Security

New Cloud Data Leak Adds to Capita’s Woes

Colchester council says multiple local authorities are impacted This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Cloud Data Leak Adds to Capita’s Woes

Identity Crimes Remain at All-Time High in 2022

Most reports related to Google Voice scams This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Identity Crimes Remain at All-Time High in 2022

Social Engineering Risks Found in Microsoft Teams

The abuse methods require pre-existing access to a compromised user account or Teams token This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Social Engineering Risks Found in Microsoft Teams

BatLoader Impersonates ChatGPT and Midjourney in Cyber-Attacks

eSentire recommended raising awareness of malware masquerading as legitimate applications This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: BatLoader Impersonates ChatGPT and Midjourney in Cyber-Attacks

Energy Industry Faces Increasing Dark Web Cyber Threats

The claims come from the latest Searchlight Cyber threat intelligence report This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Energy Industry Faces Increasing Dark Web Cyber Threats

Acronis Launches EDR Solution with Potential for AI Integration

Acronis EDR is integrated into its Cyber Protect Cloud solution along with backup and data recovery functionalities This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Acronis Launches EDR Solution with Potential for AI Integration

Cyber-Resilience Programs Failing on Poor Visibility

Organizations need a better way to build and assess programs This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber-Resilience Programs Failing on Poor Visibility

NSO Group Spends Millions Lobbying US Government

Spyware maker wants return to “business as usual” This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NSO Group Spends Millions Lobbying US Government

Camaro Dragon APT Group Exploits TP-Link Routers With Custom Implant

The implant’s components are designed to be compatible with different firmware from various vendors This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Camaro Dragon APT Group Exploits TP-Link Routers With Custom Implant

Lacroix Shuts Three Factories For a Week After Cyber-Attack

The targeted cyber-attack hit activity sites in France, Germany and Tunisia This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Lacroix Shuts Three Factories For a Week After Cyber-Attack

BEC Attackers Spoof CC’d Execs to Force Payment

Armorblox uncovers another new tactic used by email fraudsters This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: BEC Attackers Spoof CC’d Execs to Force Payment

Researchers Uncover New “RA Group” Ransomware

Actor is using leaked Babuk code to target firms This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Researchers Uncover New “RA Group” Ransomware

PharMerica Breach Hits Over 5.8 Million Customers

Medical and insurance data exposed in ransomware attack This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: PharMerica Breach Hits Over 5.8 Million Customers

Qilin’s Dark Web Ransomware Targets Critical Sectors

Group-IB’s threat intelligence team said it infiltrated and analyzed Qilin’s inner workings This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Qilin’s Dark Web Ransomware Targets Critical Sectors

Ex-Ubiquiti Employee Imprisoned For $2m Crypto Extortion Scheme

The defendant was also ordered to pay $1.6m in restitution and forfeit property used for the crimes This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ex-Ubiquiti Employee Imprisoned For $2m Crypto Extortion Scheme

Discord Breached After Service Agent Targeted

Incident impacts user emails and support messages This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Discord Breached After Service Agent Targeted

PaperCut Software Flaw Sparks Ransomware Attacks, CISA Warns

The bug allowed cyber-criminals to remotely execute malicious code without authentication credentials This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: PaperCut Software Flaw Sparks Ransomware Attacks, CISA Warns

Software Supply Chain Attacks Hit 61% of Firms

Only half of firms are requesting a software bill of materials This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Software Supply Chain Attacks Hit 61% of Firms

Card ‘ID Theft’ Fraud Doubles in 2022

UK Finance figures show growing online menace This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Card ‘ID Theft’ Fraud Doubles in 2022

Threat Actors Use Babuk Code to Build Hypervisor Ransomware

According to SentinelOne, these novel variants emerged between 2022 and 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Threat Actors Use Babuk Code to Build Hypervisor Ransomware

NCSC and ICO Dispel Incident Reporting Myths

Keeping attacks a secret only helps the criminals, they warn This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCSC and ICO Dispel Incident Reporting Myths

Ransomware Encryption Rates Reach New Heights

Overall, ransomware infections remain steady, Sophos maintains This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Encryption Rates Reach New Heights