Security researchers at Check Point published a new advisory on Tuesday describing the new malware This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Raspberry Robin Adopts Unique Evasion Techniques
Tag: http://www.infosecurity-magazine.com/rss/news/76/application-security/
Nurse Call Systems, Infusion Pumps Riskiest Connected Medical Devices
The findings come from a new report by asset visibility and security company Armis This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Nurse Call Systems, Infusion Pumps Riskiest Connected Medical Devices
#CYBERUK23: NCSC Urges International Collaboration to Build Cyber Resilience
The NCSC’s CEO, Lindy Cameron, urges the UK to cooperate more with its allies in combating cyber threats This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #CYBERUK23: NCSC Urges International Collaboration to Build Cyber Resilience
Police Escape $1.2m Fine For Secretly Recording Phone Calls
Surrey and Sussex police forces reprimanded after recording 200,000 calls This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Police Escape $1.2m Fine For Secretly Recording Phone Calls
Triple-digit Increase in API and App Attacks on Tech and Retail
Web attacks also surge in financial services, although not in UK This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Triple-digit Increase in API and App Attacks on Tech and Retail
NCSC Warns of Destructive Russian Attacks on Critical Infrastructure
Alert follows advisory about Kremlin hackers targeting Cisco routers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCSC Warns of Destructive Russian Attacks on Critical Infrastructure
Goldoson Malware Found in Dozens of Google Play Store Apps
The malicious software library can collect installed app lists, Wi-Fi and Bluetooth data, and more This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Goldoson Malware Found in Dozens of Google Play Store Apps
MuddyWater Uses SimpleHelp to Target Critical Infrastructure Firms
A new advisory by Group-IB suggests the software used as part of these attacks is not compromised This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: MuddyWater Uses SimpleHelp to Target Critical Infrastructure Firms
NSO Group’s Pegasus Spyware Found on High-Risk iPhones
The findings by Jamf suggest the observed attacks are highly targeted This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NSO Group’s Pegasus Spyware Found on High-Risk iPhones
Cyber Intrusion Detection Time at an All-Time Low
Mandiant’s latest M-Trends report shows that organizations only needed a median time of 16 days to detect an intrusion in 2022 – the lowest dwell time ever recorded by the firm This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the…
WhatsApp, Signal Claim Online Safety Bill Threatens User Privacy and Safety
The UK Government OSB undermines end-to-end encrypted communications and must be reconsidered according to an open letter signed by Signal and WhatsApp This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: WhatsApp, Signal Claim Online Safety Bill Threatens…
Cloud Security Alerts Take Six Days to Resolve
Palo Alto report warns of an expanding cloud attack surface This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Cloud Security Alerts Take Six Days to Resolve
Conversational Attacks Fastest Growing Mobile Threat
Pig butchering and similar scams could soon be AI-driven This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Conversational Attacks Fastest Growing Mobile Threat
UK’s SMEs to Benefit From New Cyber Advisors
Accredited consultants will drive Cyber Essentials take-up This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK’s SMEs to Benefit From New Cyber Advisors
Phishing Attacks Surge as Threat Actors Leverage New AI Tools
Large language models like ChatGPT and phishing kits have significantly contributed to the growth of phishing, Zscaler’s 2023 ThreatLabz Phishing Report claims This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Phishing Attacks Surge as Threat Actors Leverage…
Montana Becomes First US State to Pass TikTok Ban
The ban needs to be signed into law by Republican Governor Greg Gianforte This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Montana Becomes First US State to Pass TikTok Ban
Ransomware Attack Hits Payments Giant NCR’s Datacenter
The ransomware attack targeted one of its data centers in Hawaii and affected some PoS products This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ransomware Attack Hits Payments Giant NCR’s Datacenter
Qbot Banking Trojan Increasingly Delivered Via Business Emails
Observed by Kaspersky, the campaign relied on emails written in English, German, Italian and French This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Qbot Banking Trojan Increasingly Delivered Via Business Emails
Friendly Hacker, Keren Elazari, to Announced as Keynote Speaker at Infosecurity Europe 2023
Acclaimed analyst and author, Keren Elazari, to deliver keynote exploring the intersection of cyber conflict and politics at Infosecurity Europe 2023 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Friendly Hacker, Keren Elazari, to Announced as Keynote…
Spyware Company QuaDream Set to Close
Under-fire Israeli firm was accused of developing zero-day exploits This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Spyware Company QuaDream Set to Close
CISA: Patch Bug Exploited by Chinese E-commerce App
Zero-day was linked to malicious Pinduoduo apps This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA: Patch Bug Exploited by Chinese E-commerce App
Police Crack Comms to Bust Money Laundering Group
Case relied on decrypting Sky ECC messages This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Police Crack Comms to Bust Money Laundering Group
CISA Asks Manufacturers to Prioritize Cybersecurity in Product Design
The guidelines were created by several cybersecurity organizations worldwide This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Asks Manufacturers to Prioritize Cybersecurity in Product Design
RTM Locker Gang Targets Corporate Environments with Ransomware
Trellix said the businesslike approach of the group shows its organizational maturity This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: RTM Locker Gang Targets Corporate Environments with Ransomware
Hyundai Experiences Cybersecurity Issues: Breach and App Bugs
The breach affected Italian and French car owners as well as individuals who booked test drives This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Hyundai Experiences Cybersecurity Issues: Breach and App Bugs
UK Education Sector Suffered Most from Ransomware in 2022
British schools were hit far more than those abroad This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Education Sector Suffered Most from Ransomware in 2022
Five Arrests in Crackdown on $98m Investment Fraud Gang
Police estimate the victim count exceeds 30,000 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Five Arrests in Crackdown on $98m Investment Fraud Gang
Volume of Opaque Breach Notices Surges in Q1
Non-profit calls for more actionable information for victims This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Volume of Opaque Breach Notices Surges in Q1
Over 20,000 Iowa Medicaid Members Affected By Data Breach
The breach was due to an attack on a contractor’s computer systems This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Over 20,000 Iowa Medicaid Members Affected By Data Breach
Pakistan-Aligned Hackers Disrupt Indian Education Sector
APT36 targeted institutions with malicious Office documents distributing Crimson RAT This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Pakistan-Aligned Hackers Disrupt Indian Education Sector
GuLoader Targets US Financial Firms With Tax-Themed Phishing Lures
Security researchers at eSentire shared the findings in an advisory published on Monday This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: GuLoader Targets US Financial Firms With Tax-Themed Phishing Lures
Stolen Card Volumes Plummet 94% Globally
Blow for card fraudsters, although UK is an outlier This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Stolen Card Volumes Plummet 94% Globally
Superyacht-Maker Hit by Easter Ransomware Attack
Bremen shipbuilder Lürssen tight-lipped on details This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Superyacht-Maker Hit by Easter Ransomware Attack
Rapid7 Has Good News for UK Security Posture
FTSE 350 firms on a par with global peers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Rapid7 Has Good News for UK Security Posture
CISA Updates Zero Trust Maturity Model With Public Feedback
The guidelines aim to further the US federal government’s progress toward a zero trust approach This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: CISA Updates Zero Trust Maturity Model With Public Feedback
Lazarus Group’s DeathNote Campaign Reveals Shift in Targets
Kaspersky uncovered a shift in the attack’s targets and updated infection vectors in 2020 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Lazarus Group’s DeathNote Campaign Reveals Shift in Targets
Emotet Climbs March 2023’s Most Wanted Malware List With OneNote Campaign
The malicious software tool is now second on the list, one spot up from February’s report This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Emotet Climbs March 2023’s Most Wanted Malware List With OneNote Campaign
Researchers Uncover 7000 Malicious Open Source Packages
W4SP stealer copycats among the latest finds This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Researchers Uncover 7000 Malicious Open Source Packages
Ethical Hackers Could Earn up to $20,000 Uncovering ChatGPT Vulnerabilities
Following criticisms around ChatGPT’ security and privacy practices, OpenAI has launched a bug bounty program to help identify vulnerabilities across its systems and services This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ethical Hackers Could Earn up…
New Zero-Click iOS Exploit Deploys Israeli Spyware
Researchers say exploit is delivered via iCloud calendar invitation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Zero-Click iOS Exploit Deploys Israeli Spyware
Microsoft Fixes Zero-Day Bug This Patch Tuesday
It is one of around 100 software flaws addressed this month This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Fixes Zero-Day Bug This Patch Tuesday
Apple Patches Two Zero-Days Exploited in the Wild
Vulnerabilities affect macOS Ventura 13.3.1 and iOS and iPadOS 16.4.1 devices This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Apple Patches Two Zero-Days Exploited in the Wild
Malicious Android Apps Sold For Up to $20,000 on Darknet
Like on legitimate forums, Kaspersky explained there are various darknet offers for these apps This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Malicious Android Apps Sold For Up to $20,000 on Darknet
Eliminating 2% of Exposures Could Protect 90% of Critical Assets
The findings come from the latest report by XM Cyber and the Cyentia Institute This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Eliminating 2% of Exposures Could Protect 90% of Critical Assets
US Scrambles to Investigate Military Intel Leak
Publication of classified docs could help Russian war effort This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Scrambles to Investigate Military Intel Leak
KFC Owner Discloses Data Breach
Yum! Brands warns of fallout from January incident This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: KFC Owner Discloses Data Breach
Latitude Financial Refuses to Pay Ransom
Breached Aussie firm says it will only embolden extorters This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Latitude Financial Refuses to Pay Ransom
Threat Actors Increasingly Use Telegram For Phishing Purposes
The findings come from cybersecurity experts at Kaspersky This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Threat Actors Increasingly Use Telegram For Phishing Purposes
Uber Drivers’ Data Exposed in Breach of Law Firm’s Servers
New Jersey-based Genova Burns disclosed the breach in an email to customers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Uber Drivers’ Data Exposed in Breach of Law Firm’s Servers
Google Mandates Data Deletion Policy For Android Apps
Developers have until December 7 to submit answers to data deletion questions This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google Mandates Data Deletion Policy For Android Apps
Securing Medical Devices is a Matter of Life and Death
The cybersecurity challenges of the Internet of Medical Things (IoMT) are still largely unanswered This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Securing Medical Devices is a Matter of Life and Death
Prolific Spanish Teen Hacking Suspect Arrested
Jose Luis Huertas boasted of accessing 90% of Spaniards’ info This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Prolific Spanish Teen Hacking Suspect Arrested
Two-Fifths of IT Pros Told to Keep Breaches Quiet
The figure rises to 70% of those in the US This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Two-Fifths of IT Pros Told to Keep Breaches Quiet
UK Criminal Records Office Crippled by “Cyber Incident”
Ransomware suspected as visa applications are hit This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Criminal Records Office Crippled by “Cyber Incident”
How the Last Big Breach Will Help You Prepare for the Next Cyber Crisis
Microsoft’s Sarah Armstrong-Smith explains why past incidents are crucial to informing our incident response strategies This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: How the Last Big Breach Will Help You Prepare for the Next Cyber Crisis
UK Discloses Offensive Cyber Capabilities Principles
The National Cyber Force, a joint agency between GCHQ and the Ministry of Defence, revealed the principles ruling its cyber operations This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Discloses Offensive Cyber Capabilities Principles
FBI Leads International Effort to Seize Domains for Notorious Genesis Market
Cybercrime marketplace facilitated trade in stolen credentials This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: FBI Leads International Effort to Seize Domains for Notorious Genesis Market
Database Snafu Leaks 600K Records from Marketplace
Z2U users accused of selling online accounts and malware This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Database Snafu Leaks 600K Records from Marketplace
Malicious Spam Campaign Downs npm Registry
SEO poisoning drives surge in traffic This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Malicious Spam Campaign Downs npm Registry
New “Rorschach” Ransomware Spread Via Commercial Product
The ransomware strain uses a signed component of the Palo Alto Cortex XDR Dump Service Tool This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New “Rorschach” Ransomware Spread Via Commercial Product
Western Digital Hit By Network Security Breach
The incident involved an unauthorized third party gaining access to several systems This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Western Digital Hit By Network Security Breach
TikTok Fined £12.7m For Violating UK Data Privacy Laws
The ICO said TikTok failed to provide proper information on how data is collected, used and shared This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: TikTok Fined £12.7m For Violating UK Data Privacy Laws
HTTP/S DDoS Attacks Soar 487% in Three Years
Website takedowns driven by Russian hacktivists This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: HTTP/S DDoS Attacks Soar 487% in Three Years
US Authorities Seize $112m From “Pig Butchering” Scammers
Six crypto wallets now under government control This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Authorities Seize $112m From “Pig Butchering” Scammers
Crypto Firms Are Likely Target for 3CX Attacks
Kaspersky links campaign to Gopuram backdoor This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Crypto Firms Are Likely Target for 3CX Attacks
US DoD Unveils Website For Hack the Pentagon Bug Bounty Program
It will be a resource for DoD organizations, vendors and security researchers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US DoD Unveils Website For Hack the Pentagon Bug Bounty Program
TikTok to Comply With US Law, Protect User Data From China
Erich Andersen, general counsel for TikTok, confirmed company will safeguard US user data from China This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: TikTok to Comply With US Law, Protect User Data From China
Unapproved Apps Used By 32% of Remote Workers
Latest Lookout report also suggested 46% of remote employees saved work files to personal devices This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Unapproved Apps Used By 32% of Remote Workers
Dish Network Hit with Multiple Securities Class Action Lawsuits
Pay TV firm accused of misleading investors This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Dish Network Hit with Multiple Securities Class Action Lawsuits
Consumer Loans Firm TMX Reveals Major Data Breach
Nearly five million impacted by December 2022 incident This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Consumer Loans Firm TMX Reveals Major Data Breach
Outsourcer Capita Claims to Have Contained “Cyber Incident”
Firm has billions of pounds worth of government contracts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Outsourcer Capita Claims to Have Contained “Cyber Incident”
Italy’s Privacy Watchdog Blocks ChatGPT Amid Privacy Concerns
GPDP probe is due to allegations that ChatGPT failed to comply with data collection rules This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Italy’s Privacy Watchdog Blocks ChatGPT Amid Privacy Concerns
Modular “AlienFox” Toolkit Used to Steal Cloud Service Credentials
Harvesting API keys and secrets from AWS SES, Microsoft Office 365 and other services This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Modular “AlienFox” Toolkit Used to Steal Cloud Service Credentials
New Azure Flaw “Super FabriXss” Enables Remote Code Execution Attacks
The cross-site scripting flaw affects SFX version 9.1.1436.9590 or earlier and has a CVSS of 8.2 This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New Azure Flaw “Super FabriXss” Enables Remote Code Execution Attacks
UK Regulator: HIV Data Protection Must Improve
ICO issues call after reprimanding NHS Highland This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: UK Regulator: HIV Data Protection Must Improve
GCHQ Updates Security Guidance for Boards
Agency wants business leaders to get serious about cyber This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: GCHQ Updates Security Guidance for Boards
Ukrainian Police Bust Multimillion-Dollar Phishing Gang
More than 100 sites created to lure European victims This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Ukrainian Police Bust Multimillion-Dollar Phishing Gang
North Korean Hackers Use Trojanized 3CX DesktopApp in Supply Chain Attacks
Windows and Mac versions of the software were compromised to deliver infostealers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: North Korean Hackers Use Trojanized 3CX DesktopApp in Supply Chain Attacks
Over 70% of Employees Keep Work Passwords on Personal Devices
95% of security leaders are also concerned about phishing attacks via private messaging apps This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Over 70% of Employees Keep Work Passwords on Personal Devices
FDA Protects Medical Devices Against Cyber-Threats With New Measures
New medical devices applications should “monitor, identify, and address” cybersecurity issues This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: FDA Protects Medical Devices Against Cyber-Threats With New Measures
Volume of HTTPS Phishing Sites Surges 56% Annually
Scammers are increasingly trying to legitimize their efforts This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Volume of HTTPS Phishing Sites Surges 56% Annually
NCA Celebrates Multimillion-Pound Fraud Takedowns
Agency says it has seized hundreds of assets in month-long operation This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCA Celebrates Multimillion-Pound Fraud Takedowns
Thieves Steal $9m from Crypto Liquidity Pool
SafeMoon claims exploited vulnerability was to blame This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Thieves Steal $9m from Crypto Liquidity Pool
Google Warns Against Commercial Spyware Exploiting Zero-Days
Spyware vendors facilitated the spread of malware by government-backed threat actors This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Google Warns Against Commercial Spyware Exploiting Zero-Days
Clop Ransomware Group Exploits GoAnywhere MFT Flaw
The vulnerability has a CVSS score of 7.2 and was exploited against several companies in the US This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clop Ransomware Group Exploits GoAnywhere MFT Flaw
Attacks Targeting APIs Increased By 400% in Last Six Months
The new Salt Security report found that 80% of attacks happened over authenticated APIs This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Attacks Targeting APIs Increased By 400% in Last Six Months
ChatGPT Vulnerability May Have Exposed Users’ Payment Information
The breach was caused by a bug in an open-source library This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: ChatGPT Vulnerability May Have Exposed Users’ Payment Information
Tech Industry Bids to Tackle Cyber-Mercenary Epidemic
New principles designed to disrupt and limit a rapidly growing market This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Tech Industry Bids to Tackle Cyber-Mercenary Epidemic
Just 1% of Cloud Permissions Are Actively Used
Microsoft warns of “permissions gap” security threat This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Just 1% of Cloud Permissions Are Actively Used
Experts Warn of Self-Funding North Korean Group APT43
Mandiant says unit is focused on espionage and crypto theft This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Experts Warn of Self-Funding North Korean Group APT43
Clipboard-Injector Attacks Target Cryptocurrency Users
The malware campaign relying on this technique was observed abusing Tor Browser installers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Clipboard-Injector Attacks Target Cryptocurrency Users
Apple Releases Security Patches For Older iPhone and iPad Models
The vulnerability refers to a type confusion bug in the WebKit browser engine This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Apple Releases Security Patches For Older iPhone and iPad Models
France Bans TikTok, Other ‘Fun’ Apps From Government Devices
The move is expected to affect roughly 2.5 million government officials This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: France Bans TikTok, Other ‘Fun’ Apps From Government Devices
Four Years Behind Bars for Prolific BEC Scammer
Solomon Ekunke Okpe and others made over $1m from online fraud This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Four Years Behind Bars for Prolific BEC Scammer
Call for Submissions to UK’s New Computer Misuse Act
Bugcrowd is concerned about a lack of protection for ethical hackers This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Call for Submissions to UK’s New Computer Misuse Act
US Moves to Ban “Anti-Democratic” Spyware
White House says use of tools must be aligned with human rights This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: US Moves to Ban “Anti-Democratic” Spyware
Microsoft Fixes Security Flaw in Windows Screenshot Tools
Information disclosure vulnerability aCropalypse could enable malicious actors to recover sections of screenshots This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft Fixes Security Flaw in Windows Screenshot Tools
Three Variants of IcedID Malware Discovered
The new variants hint that considerable effort is going into the future of IcedID and its codebase This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Three Variants of IcedID Malware Discovered
New MacStealer Targets Catalina, Newer MacOS Versions
The malware can extract information from documents, browser cookies and login information This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: New MacStealer Targets Catalina, Newer MacOS Versions
NCA Harvests Info on DDoS-For-Hire With Fake Booter Sites
Agency attempts to disrupt the cybercrime underground This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: NCA Harvests Info on DDoS-For-Hire With Fake Booter Sites