Tag: http://www.infosecurity-magazine.com/rss/news/76/application-security/

Spanish Police Arrest 40 in Phishing Gang Bust

Organized crime ring used phishing to fund operation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Spanish Police Arrest 40 in Phishing Gang Bust

Microsoft Patches Three Zero-Day Bugs This Month

This month’s Patch Tuesday more manageable for sysadmins This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Patches Three Zero-Day Bugs This Month

ISACA: Companies Still Face Many Barriers to Achieving Digital Trust

While ISACA’s concept of digital trust is increasingly recognized as key to digital transformation, business leaders are still faced with many bottlenecks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ISACA: Companies Still Face Many Barriers to…

New Botnet Campaign Exploits Ruckus Wireless Flaw

Tracked CVE-2023-25717, the flaw was recently exploited by the AndoryuBot botnet, says Fortinet This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Botnet Campaign Exploits Ruckus Wireless Flaw

Only 39% of IT Security Decision-Makers See it As Business Enabler

The Delinea report also suggests 36% of them believe cybersecurity is only important for compliance This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Only 39% of IT Security Decision-Makers See it As Business Enabler

Operation Power Off: 13 More Booter Sites Seized

Four pleaded guilty to running DDoS-for-hire operations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Operation Power Off: 13 More Booter Sites Seized

Five Takeaways From the Russian Cyber-Attack on Viasat’s Satellites

The 2022 AcidRain wiper attack, which shut down satellite services for thousands of people in Ukraine and Western Europe, was extensively discussed during the CYSAT conference in Paris This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Five…

Dallas Police Department Compromised in Ransomware Attack

The attack took down essential services, including some 911 dispatch systems This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Dallas Police Department Compromised in Ransomware Attack

North Korean APT Kimsuky Launches Global Spear-Phishing Campaign

ReconShark is sent via emails containing OneDrive links leading to documents with malicious macros This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: North Korean APT Kimsuky Launches Global Spear-Phishing Campaign

Cyber Patrols Lead to Seizure of Stolen Artefacts

Items dating back thousands of years recovered in new crackdown This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cyber Patrols Lead to Seizure of Stolen Artefacts

Ransomware Actors Extort University Via Alert System

Innovative tactics turn up the heat on Bluefield University This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Actors Extort University Via Alert System

Meta Tackles Malware Posing as ChatGPT in Persistent Campaigns

Malware families detected and disrupted include Ducktail and the newly identified NodeStealer This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Meta Tackles Malware Posing as ChatGPT in Persistent Campaigns

Android Spyware BouldSpy Linked to Iranian Government

The mobile malware has been used by threat actors to target minority groups This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Android Spyware BouldSpy Linked to Iranian Government

Consumer Group Slams Bank App Fraud Failings

Which? wants banks to improve customer outreach and security This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Consumer Group Slams Bank App Fraud Failings

Malicious HTML Attachment Volumes Surge

File type remains the most dangerous in email-borne threats This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Malicious HTML Attachment Volumes Surge

CISA Advises FCC Covered List For Risk Management

Some of the companies included in the list are Huawei, ZTE, Dahua and China Unicom This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Advises FCC Covered List For Risk Management

Apple and Google Unveil Industry Specification For Unwanted Tracking

The new standard ensures that Bluetooth location-tracking can work with unauthorized tracking detection and alerts on iOS and Android This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Apple and Google Unveil Industry Specification For Unwanted Tracking

Dark Web Bust Leads to Arrest of 288 Suspects

Suspects used Monopoly Market to buy and sell drugs This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Dark Web Bust Leads to Arrest of 288 Suspects

Bitmarck Halts Operations Due to Cybersecurity Breach

Bitmarck does not believe customer data was impacted due to the breach This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Bitmarck Halts Operations Due to Cybersecurity Breach

South Korean Lures Used to Deploy ROKRAT Malware

This shift is not exclusive to ROKRAT but represents a larger trend that became popular in 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: South Korean Lures Used to Deploy ROKRAT Malware

Hackers Exploit High Severity Flaw in TBK DVR Camera System

Vulnerability derives from an error the camera experiences when handling a maliciously crafted HTTP cookie This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Hackers Exploit High Severity Flaw in TBK DVR Camera System

T-Mobile Reveals Second Breach of the Year

Telco giant says issue began in late February This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: T-Mobile Reveals Second Breach of the Year

Advanced Fee Fraud Surges by Over 600%

However, computer misuse remains unchanged from before the pandemic This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Advanced Fee Fraud Surges by Over 600%

Global Cyber Attacks Rise by 7% in Q1 2023

Check Point also said the education and research sector experienced the highest number of attacks This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Global Cyber Attacks Rise by 7% in Q1 2023

Android Apps Fail to Protect User Data During Device Transfer

CloudSEK said that in some applications such as WhatsApp, attackers could also bypass 2FA This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Android Apps Fail to Protect User Data During Device Transfer

Google Bans 173,000 Bad Developers in 2022

Efforts were part of a Google Play fraud and malware crackdown This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google Bans 173,000 Bad Developers in 2022

#RSAC: Organizations Warned About the Latest Attack Techniques

A range of experts provide insights into new techniques being used by cyber-threat actors This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: Organizations Warned About the Latest Attack Techniques

Vietnamese Hackers Linked to ‘Malverposting’ Campaign

Security experts at Guardio Labs discussed the findings in a new blog post This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Vietnamese Hackers Linked to ‘Malverposting’ Campaign

RTM Locker Ransomware Targets Linux Architecture

Security researchers at Uptycs shared the findings in an advisory published on Wednesday This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: RTM Locker Ransomware Targets Linux Architecture

#RSAC: Securing Software Supply Chains Requires Outside-the-Box Thinking

At RSA, cybersecurity experts discussed the unique nature of software supply chain attacks and approaches to tackling this growing threat This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: Securing Software Supply Chains Requires Outside-the-Box Thinking

APT Groups Expand Reach to New Industries and Geographies

The findings come from Kaspersky’s latest APT trends report for the first quarter of 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: APT Groups Expand Reach to New Industries and Geographies

Google Goes After CryptBot Distributors

Info-stealing malware infected over 600,000 machines This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google Goes After CryptBot Distributors

#RSAC: ISACA’s New Ransomware Incident Checklist to Aid Cyber Pros

ISACA’s Rob Clyde tells Infosecurity about the role of the guidance as well as new findings about cyber insurance This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: ISACA’s New Ransomware Incident Checklist to Aid Cyber Pros

Critical Flaw Patched in VMware Workstation and Fusion

A malicious actor with local admin privileges could exploit the vulnerability to escape from the VM This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Critical Flaw Patched in VMware Workstation and Fusion

UK Cyber Pros Burnt Out and Overwhelmed

Alert fatigue is a major issue, says Expel This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Cyber Pros Burnt Out and Overwhelmed

#RSAC: Ransomware Poses Growing Threat to Five Eyes Nations

Representatives of four of the five Five Eyes nations outlined the growing threat ransomware poses and approaches to thwart it This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: Ransomware Poses Growing Threat to Five Eyes Nations

#RSAC: Characterless Security Training Fails to Change User Behavior

Experts from Amazon and the NCA offered tips on how to engage end users with cyber awareness training This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: Characterless Security Training Fails to Change User Behavior

#RSAC: AI Can Help Save Our Democracy

Bruce Schneier explains why the current democratic system is not fit for purpose, and the potential role of AI in future governance This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: AI Can Help Save Our Democracy

#RSAC: Election Protection is CISA’s Top Priority for Next 18 Months

Protecting the democratic process from cyber-criminals is a top priority for CISA over the next 18 months, ahead of the US General Election This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: Election Protection is CISA’s Top…

Google Finds Flaws in Intel TDX After Nine-Month Audit

Intel reportedly remediated all of the issues identified by Google This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google Finds Flaws in Intel TDX After Nine-Month Audit

#RSAC: US DoJ Prioritizes Victim Support in Cybercrime Crackdown

The DoJ’s Lisa Monaco urges organizations to work with the federal government following cyber-incidents This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: US DoJ Prioritizes Victim Support in Cybercrime Crackdown

#RSAC: Climate Change is Increasing Cyber-Risks

Chloe Messdaghi outlines the link between climate change and increased cyber-threats, and says this topic must be addressed This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #RSAC: Climate Change is Increasing Cyber-Risks

Scammers Impersonate Meta in Facebook Campaign With 3200 Profiles

Phishing websites and session hijacking attacks were used to access Facebook and other accounts. This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Scammers Impersonate Meta in Facebook Campaign With 3200 Profiles

Cloud Complexity Means Bugs Are Missed in Testing

Most CISOs think vulnerability management is getting harder This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cloud Complexity Means Bugs Are Missed in Testing

CFPB Employee Sends 256,000 Consumers’ Data to Personal Email

Congressman Bill Huizenga addressed the claims in a letter to CFPB director, Rohit Chopra This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CFPB Employee Sends 256,000 Consumers’ Data to Personal Email

Evil Extractor Targets Windows Devices to Steal Sensitive Data

New malware operates through several modules that rely on a File Transfer Protocol service This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Evil Extractor Targets Windows Devices to Steal Sensitive Data

Trojanized Installers Used to Distribute Bumblebee Malware

Secureworks’ Counter Threat Unit analyzed the findings in a report published on Thursday This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Trojanized Installers Used to Distribute Bumblebee Malware

China Developing Anti-Satellite Weapons – Report

Pentagon leak reveals US concerns over technology push This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: China Developing Anti-Satellite Weapons – Report

Capita: Data Was Taken in March Cyber Incident

IT outsourcer claims customer, employee and supplier info may be at risk This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Capita: Data Was Taken in March Cyber Incident

North Korean Hacker Suspected in 3CX Software Supply Chain Attack

Mandiant said this would be the first instance of a software supply chain attack leading to another This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: North Korean Hacker Suspected in 3CX Software Supply Chain Attack

Daggerfly APT Targets African Telecoms Firm With New MgBot Malware

Symantec described the findings today, saying the ongoing campaign likely started in November 2022 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Daggerfly APT Targets African Telecoms Firm With New MgBot Malware

ChatGPT-Related Malicious URLs on the Rise

Newly registered and squatting domains related to ChatGPT grew by 910% between November and April This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ChatGPT-Related Malicious URLs on the Rise

#CYBERUK23: UK Strengthens Cybersecurity Audits for Government Agencies

GovAssure will mandate all UK government departments to go through annual independent, more robust security audits This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #CYBERUK23: UK Strengthens Cybersecurity Audits for Government Agencies

Recycled Network Devices Exposing Corporate Secrets

ESET warns of breach risk from kit that is not properly decommissioned This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Recycled Network Devices Exposing Corporate Secrets

Small Business Interest in Cyber-Hygiene is Waning

UK government survey finds they are prioritizing other things This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Small Business Interest in Cyber-Hygiene is Waning