Tag: http://www.infosecurity-magazine.com/rss/news/76/application-security/

Raspberry Robin Adopts Unique Evasion Techniques

Security researchers at Check Point published a new advisory on Tuesday describing the new malware This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Raspberry Robin Adopts Unique Evasion Techniques

Goldoson Malware Found in Dozens of Google Play Store Apps

The malicious software library can collect installed app lists, Wi-Fi and Bluetooth data, and more This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Goldoson Malware Found in Dozens of Google Play Store Apps

MuddyWater Uses SimpleHelp to Target Critical Infrastructure Firms

A new advisory by Group-IB suggests the software used as part of these attacks is not compromised This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: MuddyWater Uses SimpleHelp to Target Critical Infrastructure Firms

NSO Group’s Pegasus Spyware Found on High-Risk iPhones

The findings by Jamf suggest the observed attacks are highly targeted This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NSO Group’s Pegasus Spyware Found on High-Risk iPhones

Cyber Intrusion Detection Time at an All-Time Low

Mandiant’s latest M-Trends report shows that organizations only needed a median time of 16 days to detect an intrusion in 2022 – the lowest dwell time ever recorded by the firm This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the…

WhatsApp, Signal Claim Online Safety Bill Threatens User Privacy and Safety

The UK Government OSB undermines end-to-end encrypted communications and must be reconsidered according to an open letter signed by Signal and WhatsApp This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: WhatsApp, Signal Claim Online Safety Bill Threatens…

Cloud Security Alerts Take Six Days to Resolve

Palo Alto report warns of an expanding cloud attack surface This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cloud Security Alerts Take Six Days to Resolve

Conversational Attacks Fastest Growing Mobile Threat

Pig butchering and similar scams could soon be AI-driven This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Conversational Attacks Fastest Growing Mobile Threat

UK’s SMEs to Benefit From New Cyber Advisors

Accredited consultants will drive Cyber Essentials take-up This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK’s SMEs to Benefit From New Cyber Advisors

Phishing Attacks Surge as Threat Actors Leverage New AI Tools

Large language models like ChatGPT and phishing kits have significantly contributed to the growth of phishing, Zscaler’s 2023 ThreatLabz Phishing Report claims This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Phishing Attacks Surge as Threat Actors Leverage…

Montana Becomes First US State to Pass TikTok Ban

The ban needs to be signed into law by Republican Governor Greg Gianforte This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Montana Becomes First US State to Pass TikTok Ban

Ransomware Attack Hits Payments Giant NCR’s Datacenter

The ransomware attack targeted one of its data centers in Hawaii and affected some PoS products This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Attack Hits Payments Giant NCR’s Datacenter

Qbot Banking Trojan Increasingly Delivered Via Business Emails

Observed by Kaspersky, the campaign relied on emails written in English, German, Italian and French This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Qbot Banking Trojan Increasingly Delivered Via Business Emails

Spyware Company QuaDream Set to Close

Under-fire Israeli firm was accused of developing zero-day exploits This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Spyware Company QuaDream Set to Close

RTM Locker Gang Targets Corporate Environments with Ransomware

Trellix said the businesslike approach of the group shows its organizational maturity This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: RTM Locker Gang Targets Corporate Environments with Ransomware

Hyundai Experiences Cybersecurity Issues: Breach and App Bugs

The breach affected Italian and French car owners as well as individuals who booked test drives This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Hyundai Experiences Cybersecurity Issues: Breach and App Bugs

Volume of Opaque Breach Notices Surges in Q1

Non-profit calls for more actionable information for victims This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Volume of Opaque Breach Notices Surges in Q1

Over 20,000 Iowa Medicaid Members Affected By Data Breach

The breach was due to an attack on a contractor’s computer systems This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Over 20,000 Iowa Medicaid Members Affected By Data Breach

Pakistan-Aligned Hackers Disrupt Indian Education Sector

APT36 targeted institutions with malicious Office documents distributing Crimson RAT This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Pakistan-Aligned Hackers Disrupt Indian Education Sector

Stolen Card Volumes Plummet 94% Globally

Blow for card fraudsters, although UK is an outlier This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Stolen Card Volumes Plummet 94% Globally

Superyacht-Maker Hit by Easter Ransomware Attack

Bremen shipbuilder Lürssen tight-lipped on details This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Superyacht-Maker Hit by Easter Ransomware Attack

Rapid7 Has Good News for UK Security Posture

FTSE 350 firms on a par with global peers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Rapid7 Has Good News for UK Security Posture

CISA Updates Zero Trust Maturity Model With Public Feedback

The guidelines aim to further the US federal government’s progress toward a zero trust approach This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Updates Zero Trust Maturity Model With Public Feedback

Lazarus Group’s DeathNote Campaign Reveals Shift in Targets

Kaspersky uncovered a shift in the attack’s targets and updated infection vectors in 2020 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Lazarus Group’s DeathNote Campaign Reveals Shift in Targets

Ethical Hackers Could Earn up to $20,000 Uncovering ChatGPT Vulnerabilities

Following criticisms around ChatGPT’ security and privacy practices, OpenAI has launched a bug bounty program to help identify vulnerabilities across its systems and services This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ethical Hackers Could Earn up…

New Zero-Click iOS Exploit Deploys Israeli Spyware

Researchers say exploit is delivered via iCloud calendar invitation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Zero-Click iOS Exploit Deploys Israeli Spyware

Microsoft Fixes Zero-Day Bug This Patch Tuesday

It is one of around 100 software flaws addressed this month This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Fixes Zero-Day Bug This Patch Tuesday

Apple Patches Two Zero-Days Exploited in the Wild

Vulnerabilities affect macOS Ventura 13.3.1 and iOS and iPadOS 16.4.1 devices This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Apple Patches Two Zero-Days Exploited in the Wild

Malicious Android Apps Sold For Up to $20,000 on Darknet

Like on legitimate forums, Kaspersky explained there are various darknet offers for these apps This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Malicious Android Apps Sold For Up to $20,000 on Darknet

US Scrambles to Investigate Military Intel Leak

Publication of classified docs could help Russian war effort This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Scrambles to Investigate Military Intel Leak

KFC Owner Discloses Data Breach

Yum! Brands warns of fallout from January incident This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: KFC Owner Discloses Data Breach

Latitude Financial Refuses to Pay Ransom

Breached Aussie firm says it will only embolden extorters This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Latitude Financial Refuses to Pay Ransom

Google Mandates Data Deletion Policy For Android Apps

Developers have until December 7 to submit answers to data deletion questions This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google Mandates Data Deletion Policy For Android Apps

Securing Medical Devices is a Matter of Life and Death

The cybersecurity challenges of the Internet of Medical Things (IoMT) are still largely unanswered This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Securing Medical Devices is a Matter of Life and Death

Prolific Spanish Teen Hacking Suspect Arrested

Jose Luis Huertas boasted of accessing 90% of Spaniards’ info This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Prolific Spanish Teen Hacking Suspect Arrested

How the Last Big Breach Will Help You Prepare for the Next Cyber Crisis

Microsoft’s Sarah Armstrong-Smith explains why past incidents are crucial to informing our incident response strategies This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: How the Last Big Breach Will Help You Prepare for the Next Cyber Crisis

UK Discloses Offensive Cyber Capabilities Principles

The National Cyber Force, a joint agency between GCHQ and the Ministry of Defence, revealed the principles ruling its cyber operations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Discloses Offensive Cyber Capabilities Principles

Database Snafu Leaks 600K Records from Marketplace

Z2U users accused of selling online accounts and malware This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Database Snafu Leaks 600K Records from Marketplace

Malicious Spam Campaign Downs npm Registry

SEO poisoning drives surge in traffic This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Malicious Spam Campaign Downs npm Registry

New “Rorschach” Ransomware Spread Via Commercial Product

The ransomware strain uses a signed component of the Palo Alto Cortex XDR Dump Service Tool This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New “Rorschach” Ransomware Spread Via Commercial Product

Western Digital Hit By Network Security Breach

The incident involved an unauthorized third party gaining access to several systems This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Western Digital Hit By Network Security Breach

TikTok Fined £12.7m For Violating UK Data Privacy Laws

The ICO said TikTok failed to provide proper information on how data is collected, used and shared This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: TikTok Fined £12.7m For Violating UK Data Privacy Laws

HTTP/S DDoS Attacks Soar 487% in Three Years

Website takedowns driven by Russian hacktivists This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: HTTP/S DDoS Attacks Soar 487% in Three Years

Crypto Firms Are Likely Target for 3CX Attacks

Kaspersky links campaign to Gopuram backdoor This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Crypto Firms Are Likely Target for 3CX Attacks

TikTok to Comply With US Law, Protect User Data From China

Erich Andersen, general counsel for TikTok, confirmed company will safeguard US user data from China This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: TikTok to Comply With US Law, Protect User Data From China

Unapproved Apps Used By 32% of Remote Workers

Latest Lookout report also suggested 46% of remote employees saved work files to personal devices This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Unapproved Apps Used By 32% of Remote Workers

Consumer Loans Firm TMX Reveals Major Data Breach

Nearly five million impacted by December 2022 incident This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Consumer Loans Firm TMX Reveals Major Data Breach

Italy’s Privacy Watchdog Blocks ChatGPT Amid Privacy Concerns

GPDP probe is due to allegations that ChatGPT failed to comply with data collection rules This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Italy’s Privacy Watchdog Blocks ChatGPT Amid Privacy Concerns

UK Regulator: HIV Data Protection Must Improve

ICO issues call after reprimanding NHS Highland This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Regulator: HIV Data Protection Must Improve

GCHQ Updates Security Guidance for Boards

Agency wants business leaders to get serious about cyber This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: GCHQ Updates Security Guidance for Boards

Over 70% of Employees Keep Work Passwords on Personal Devices

95% of security leaders are also concerned about phishing attacks via private messaging apps This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Over 70% of Employees Keep Work Passwords on Personal Devices

Volume of HTTPS Phishing Sites Surges 56% Annually

Scammers are increasingly trying to legitimize their efforts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Volume of HTTPS Phishing Sites Surges 56% Annually

NCA Celebrates Multimillion-Pound Fraud Takedowns

Agency says it has seized hundreds of assets in month-long operation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCA Celebrates Multimillion-Pound Fraud Takedowns

Thieves Steal $9m from Crypto Liquidity Pool

SafeMoon claims exploited vulnerability was to blame This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Thieves Steal $9m from Crypto Liquidity Pool

Google Warns Against Commercial Spyware Exploiting Zero-Days

Spyware vendors facilitated the spread of malware by government-backed threat actors This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google Warns Against Commercial Spyware Exploiting Zero-Days

Clop Ransomware Group Exploits GoAnywhere MFT Flaw

The vulnerability has a CVSS score of 7.2 and was exploited against several companies in the US This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clop Ransomware Group Exploits GoAnywhere MFT Flaw

Attacks Targeting APIs Increased By 400% in Last Six Months

The new Salt Security report found that 80% of attacks happened over authenticated APIs This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Attacks Targeting APIs Increased By 400% in Last Six Months

Tech Industry Bids to Tackle Cyber-Mercenary Epidemic

New principles designed to disrupt and limit a rapidly growing market This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Tech Industry Bids to Tackle Cyber-Mercenary Epidemic

Just 1% of Cloud Permissions Are Actively Used

Microsoft warns of “permissions gap” security threat This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Just 1% of Cloud Permissions Are Actively Used

Experts Warn of Self-Funding North Korean Group APT43

Mandiant says unit is focused on espionage and crypto theft This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Experts Warn of Self-Funding North Korean Group APT43

Clipboard-Injector Attacks Target Cryptocurrency Users

The malware campaign relying on this technique was observed abusing Tor Browser installers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clipboard-Injector Attacks Target Cryptocurrency Users

Four Years Behind Bars for Prolific BEC Scammer

Solomon Ekunke Okpe and others made over $1m from online fraud This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Four Years Behind Bars for Prolific BEC Scammer

Call for Submissions to UK’s New Computer Misuse Act

Bugcrowd is concerned about a lack of protection for ethical hackers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Call for Submissions to UK’s New Computer Misuse Act

US Moves to Ban “Anti-Democratic” Spyware

White House says use of tools must be aligned with human rights This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Moves to Ban “Anti-Democratic” Spyware

Microsoft Fixes Security Flaw in Windows Screenshot Tools

Information disclosure vulnerability aCropalypse could enable malicious actors to recover sections of screenshots This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Fixes Security Flaw in Windows Screenshot Tools

Three Variants of IcedID Malware Discovered

The new variants hint that considerable effort is going into the future of IcedID and its codebase This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Three Variants of IcedID Malware Discovered

New MacStealer Targets Catalina, Newer MacOS Versions

The malware can extract information from documents, browser cookies and login information This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New MacStealer Targets Catalina, Newer MacOS Versions