FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ Dark Reading:

Israel's Top Tech University Targeted by DarkBit Ransomware

By: Nathan Eddy, Contributing Writer, Dark Reading — February 21st 2023 at 18:08
An Israeli university is being blackmailed by hackers. However, they aren't just after money but are looking to send a political message — and maybe something more.

☐ ☆ ✇ Dark Reading:

Attacker Allure: A Look at the Super Bowl's Operational Cyber-Risks

By: Nathan Eddy, Contributing Writer, Dark Reading — February 10th 2023 at 17:25
Event organizers should be exercising various cyberattack scenarios to ensure they have the proper checks and balances in place to respond accordingly and maintain resilience.

☐ ☆ ✇ Dark Reading:

Patching & Passwords Lead the Problem Pack for Cyber-Teams

By: Nathan Eddy, Contributing Writer, Dark Reading — February 6th 2023 at 19:18
Despite growing awareness, organizations remain plagued with unpatched vulnerabilities and weaknesses in credential policies.

☐ ☆ ✇ Dark Reading:

Google: Influence Operator Dragonbridge Floods Social Media in Sprawling Cyber Campaign

By: Nathan Eddy, Contributing Writer, Dark Reading — January 27th 2023 at 16:11
Google has mounted a massive takedown, but Dragonbridge's extensive capabilities for generating and distributing vast amounts of largely spammy content calls into question the motivation behind the group.

☐ ☆ ✇ Dark Reading:

Critical Manufacturing Sector in the Bull's-eye

By: Nathan Eddy, Contributing Writer, Dark Reading — January 20th 2023 at 16:22
Serious security flaws go unpatched, and ransomware attacks increase against manufacturers.

☐ ☆ ✇ Dark Reading:

LofyGang Uses 100s of Malicious NPM Packages to Poison Open Source Software

By: Nathan Eddy, Contributing Writer, Dark Reading — October 7th 2022 at 15:12
The group has been operating for over a year, promoting their tools in hacking forums, stealing credit card information, and using typosquatting techniques to target open source software flaws.

☐ ☆ ✇ Dark Reading:

SolarMarker Attack Leverages Weak WordPress Sites, Fake Chrome Browser Updates

By: Nathan Eddy, Contributing Writer, Dark Reading — September 30th 2022 at 14:47
The SolarMarker group is exploiting a vulnerable WordPress-run website to encourage victims to download fake Chrome browser updates, part of a new tactic in its watering-hole attacks.

☐ ☆ ✇ Dark Reading:

Cyberattackers Compromise Microsoft Exchange Servers via Malicious OAuth Apps

By: Nathan Eddy, Contributing Writer, Dark Reading — September 23rd 2022 at 15:22
Cybercriminals took control of enterprise Exchange Servers to spread large amounts of spam aimed at signing people up for bogus subscriptions.

☐ ☆ ✇ Dark Reading:

Quantify Risk, Calculate ROI

By: Nathan Eddy, Contributing Writer, Dark Reading — September 21st 2022 at 21:51
SecurityScorecard's ROI Calculator helps organizations quantify cyber-risk to understand the financial impact of a cyberattack.

☐ ☆ ✇ Dark Reading:

Cast AI Introduces Cloud Security Insights for Kubernetes

By: Nathan Eddy, Contributing Writer, Dark Reading — September 20th 2022 at 18:20
The release augments the company's Kubernetes management platform with free, user-friendly insight on security postures, along with cost monitoring and observability.

☐ ☆ ✇ Dark Reading:

How to Use SSH Keys and 1Password to Sign Git Commits

By: Nathan Eddy, Contributing Writer, Dark Reading — September 14th 2022 at 18:39
This Tech Tip walks through the steps to set up signed commits with SSH keys stored in 1Password.

☐ ☆ ✇ Dark Reading:

How Machine Learning Can Boost Network Visibility for OT Teams

By: Nathan Eddy, Contributing Writer, Dark Reading — September 12th 2022 at 21:28
Opswat says its new tool uses neural networks to protect critical environments through AI-assisted asset discovery, network visibility, and risk management.

☐ ☆ ✇ Dark Reading:

LockBit, ALPHV & Other Ransomware Gang Leak Sites Hit by DDoS Attacks

By: Nathan Eddy, Contributing Writer, Dark Reading — September 9th 2022 at 14:22
A sweeping effort to prevent a raft of targeted cybercrime groups from posting ransomware victims' data publicly is hampering their operations, causing outages.

☐ ☆ ✇ Dark Reading:

Pen Testing Evolves for the DevSecOps World

By: Nathan Eddy, Contributing Writer, Dark Reading — September 7th 2022 at 21:50
Penetration testing not only serves to triage and validate other defect discovery activities, it informs risk management activities, such as threat modeling and secure design.

☐ ☆ ✇ Dark Reading:

Researchers Spot Snowballing BianLian Ransomware Gang Activity

By: Nathan Eddy, Contributing Writer, Dark Reading — September 2nd 2022 at 18:56
The operators of the emerging cross-platform ransomware BianLian increased their command and control infrastructure this month, indicating an acceleration in their operational pace.

☐ ☆ ✇ Dark Reading:

New Guidelines Spell Out How to Test IoT Security Products

By: Nathan Eddy, Contributing Writer, Dark Reading — September 1st 2022 at 19:49
The proposed AMTSO guidelines offer a roadmap for comprehensive testing of IoT security products.

☐ ☆ ✇ Dark Reading:

Chinese Hackers Target Energy Sector in Australia, South China Sea

By: Nathan Eddy, Contributing Writer, Dark Reading — August 30th 2022 at 17:34
The phishing campaign deploying a ScanBox reconnaissance framework has targeted the Australian government and companies maintaining wind turbines in the South China Sea.

☐ ☆ ✇ Dark Reading:

BlackByte Ransomware Gang Returns With Twitter Presence, Tiered Pricing

By: Nathan Eddy, Contributing Writer, Dark Reading — August 19th 2022 at 17:17
Version 2.0 of the ransomware group's operation borrows extortion tactics from the LockBit 3.0 group.

☐ ☆ ✇ Dark Reading:

Summertime Blues: TA558 Ramps Up Attacks on Hospitality, Travel Sectors

By: Nathan Eddy, Contributing Writer, Dark Reading — August 18th 2022 at 14:38
The cybercriminal crew has used 15 malware families to target travel and hospitality companies globally, constantly changing tactics over the course of its four-year history.

☐ ☆ ✇ Dark Reading:

'Operation Sugarush' Mounts Concerning Spy Effort on Shipping, Healthcare Industries

By: Nathan Eddy, Contributing Writer, Dark Reading — August 17th 2022 at 16:35
A suspected Iranian threat actor known as UNC3890 is gathering intel that could be used for kinetic strikes against global shipping targets.

☐ ☆ ✇ Dark Reading:

Windows Vulnerability Could Crack DC Server Credentials Open

By: Nathan Eddy, Contributing Writer, Dark Reading — August 16th 2022 at 14:39
The security flaw tracked as CVE-2022-30216 could allow attackers to perform server spoofing or trigger authentication coercion on the victim.

☐ ☆ ✇ Dark Reading:

Novel Ransomware Comes to the Sophisticated SOVA Android Banking Trojan

By: Nathan Eddy, Contributing Writer, Dark Reading — August 12th 2022 at 14:58
Unusually, SOVA, which targets US users, now allows lateral movement for deeper data access. Version 5 adds an encryption capability.

☐ ☆ ✇ Dark Reading:

Cyber-Insurance Fail: Most Businesses Lack Ransomware Coverage

By: Nathan Eddy, Contributing Writer, Dark Reading — August 11th 2022 at 17:31
Even among businesses with cyber insurance, they lack coverage for basic costs of many cyberattacks, according to a BlackBerry survey.

☐ ☆ ✇ Dark Reading:

Multiple Vulnerabilities Discovered in Device42 Asset Management Appliance

By: Nathan Eddy, Contributing Writer, Dark Reading — August 10th 2022 at 22:02
Four serious security issues on the popular appliance could be exploited by hackers with any level of access within the host network, Bitdefender researchers say.

☐ ☆ ✇ Dark Reading:

Researchers Debut Fresh RCE Vector for Common Google API Tool

The finding exposes the danger of older, unpatched bugs, which plague at least 4.5 million devices.

☐ ☆ ✇ Dark Reading:

Deepfakes Grow in Sophistication, Cyberattacks Rise Following Ukraine War

A rising tide of threats — from API exploits to deepfakes to extortionary ransomware attacks — is threatening to overwhelm IT security teams.

☐ ☆ ✇ Dark Reading:

Genesis IAB Market Brings Polish to the Dark Web

As the market for initial access brokers matures, services like Genesis — which offers elite access to compromised systems and slick, professional services — are raising the bar in the underground economy.

☐ ☆ ✇ Dark Reading:

Massive China-Linked Disinformation Campaign Taps PR Firm for Help

A global network of inauthentic news sites present themselves as independent news outlets, offering content favoring China's government and articles critical of the US.

☐ ☆ ✇ Dark Reading:

American Express, Snapchat Open-Redirect Vulnerabilities Exploited in Phishing Scheme

Phishing operators are taking advantage of security bugs in the Amex and Snapchat websites (the latter is unpatched) to steer victims to phishing pages looking to harvest Google and Microsoft logins.

☐ ☆ ✇ Dark Reading:

VirusTotal: Threat Actors Mimic Legitimate Apps, Use Stolen Certs to Spread Malware

Attackers are turning to stolen credentials and posing as trusted applications to socially engineer victims, according to Google study of malware submitted to VirusTotal.

☐ ☆ ✇ Dark Reading:

Malicious npm Packages Scarf Up Discord Tokens, Credit Card Info

The campaign uses four malicious packages to spread "Volt Stealer" and "Lofy Stealer" malware in the open source npm software package repository.

☐ ☆ ✇ Dark Reading:

APT-Like Phishing Threat Mirrors Landing Pages

By dynamically mirroring an organization’s login page, threat actors are propagating legitimate-looking phishing attacks that encourage victims to offer up access to the corporate crown jewels.

☐ ☆ ✇ Dark Reading:

1,000s of Phishing Attacks Blast Off From InterPlanetary File System

The peer-to-peer network IPFS offers an ingenious base for cyberattacks and is seeing a stratospheric increase in malicious hosting.

☐ ☆ ✇ Dark Reading:

Ducktail Spear-Phishing Campaign Uses LinkedIn to Hijack Facebook Business Accounts

Ducktail targets marketing and HR professionals through LinkedIn to hijack Facebook accounts and run malvertising schemes.

☐ ☆ ✇ Dark Reading:

Critical Filewave MDM Vulnerabilities Allow Attackers Full Mobile Device Control

Two previously unknown critical vulnerabilities within FileWave’s multiplatform MDM system could grant malicious actors access to the platform's most privileged user account.

☐ ☆ ✇ Dark Reading:

Phishing Bonanza: Social-Engineering Savvy Skyrockets as Malicious Actors Cash In

The ever-evolving threat from phishing is growing more sophisticated as attackers design high-pressure situations and leverage ever-more-convincing social engineering tactics to increase their success rates.

☐ ☆ ✇ Dark Reading:

Cybercrime Group TA4563 Targets DeFi Market With Evolving Evilnum Backdoor

The cyber campaign, aimed at siphoning funds, uses an improved version of the malware, which can adjust infection paths based on recognized antivirus software.

☐ ☆ ✇ Dark Reading:

Chaotic LAPSUS$ Group Goes Quiet, but Threat Likely Persists

The LAPSUS$ group emerged with a big splash at the end of 2021, targeting companies, including Okta, with a "reckless and disruptive" approach to hacking.

☐ ☆ ✇ Dark Reading:

Software Supply Chain Concerns Reach C-Suite

Major supply chain attacks have had a significant impact on software security awareness and decision-making, with more investment planned for monitoring attack surfaces.

☐ ☆ ✇ Dark Reading:

Retbleed Fixed in Linux Kernel, Patch Delayed

Linus Torvalds says Retbleed has been addressed in the Linux kernel, but code complexity means the release will be delayed by a week to give more time for testing.

☐ ☆ ✇ Dark Reading:

Data Breaches Linked to Ransomware Declined in Q2 2022

Phishing retained its place as the top root cause of data compromises, according to new data from the Identity Theft Resource Center (ITRC).

☐ ☆ ✇ Dark Reading:

QuickBooks Vishing Scam Targets Small Businesses

Businesses receive an invoice via email with a credit card charge and are asked to call a fake number and hand over personal information to receive a refund.

☐ ☆ ✇ Dark Reading:

Ransomware Scourge Drives Price Hikes in Cyber Insurance

Cybersecurity insurance costs are rising, and insurers are likely to demand more direct access to organizational metrics and measures to make more accurate risk assessments.

☐ ☆ ✇ Dark Reading:

New Phishing Attacks Shame, Scare Victims into Surrendering Twitter, Discord Credentials

Scams pressure victims to "resolve an issue that could impact their status, business."

☐ ☆ ✇ Dark Reading:

Buggy 'Log in With Google' API Implementation Opens Crypto Wallets to Account Takeover

Improper implementations of authentication APIs at a global crypto wallet service provider could have resulted in the loss of account control — and millions of dollars — from personal and business accounts.

☐ ☆ ✇ Dark Reading:

Cloud Misconfig Exposes 3TB of Sensitive Airport Data in Amazon S3 Bucket: 'Lives at Stake'

The unsecured server exposed more than 1.5 million files, including airport worker ID photos and other PII, highlighting the ongoing cloud-security challenges worldwide.

☐ ☆ ✇ Dark Reading:

DragonForce Malaysia Releases LPE Exploit, Threatens Ransomware

The hacktivist group is ramping up its activities and ready to assault governments and businesses with escalating capabilities.

☐ ☆ ✇ Dark Reading:

Critical ManageEngine ADAudit Plus Vulnerability Allows Network Takeover, Mass Data Exfiltration

An unauthenticated remote code execution vulnerability found in Zoho’s compliance tool could leave organizations exposed to an information disclosure catastrophe, new analysis shows.

☐ ☆ ✇ Dark Reading:

ZuoRAT Hijacks SOHO Routers From Cisco, Netgear

The malware has been in circulation since 2020, with sophisticated, advanced malicious actors taking advantage of the vulnerabilities in SOHO routers as the work-from-home population expands rapidly.

☐ ☆ ✇ Dark Reading:

MetaMask Crypto-Wallet Theft Skates Past Microsoft 365 Security

The credential-phishing attack leverages social engineering and brand impersonation techniques to lead users to a spoofed MetaMask verification page.

☐ ☆ ✇ Dark Reading:

BRATA Android Malware Evolves Into an APT

The BRATA Android banking Trojan is evolving into a persistent threat with a new phishing technique and event-logging capabilities.

☐ ☆ ✇ Dark Reading:

Android Spyware 'Hermit' Discovered in Targeted Attacks

The commercial-grade surveillance software initially was used by law enforcement authorities in Italy in 2019, according to a new report.

☐ ☆ ✇ Dark Reading:

Cybercriminals Capitalizing on Resurgence in Travel

Multiple cybercrime groups have been spotted selling stolen credentials and other sensitive personal information pilfered from travel-related websites.

☐ ☆ ✇ Dark Reading:

Wormable Panchan Peer-to-Peer Botnet Harvests Linux Server Keys

The Japanese-language Panchan botnet has been discovered stealing SSH keys from Linux servers across Asia, Europe, and North America, with a focus on telecom and education providers.

☐ ☆ ✇ Dark Reading:

DoS Vulnerability Allows Easy Envoy Proxy Crashes

The DoS vulnerability allows an attacker to create a Brotli "zip bomb," resulting in acute performance issues on Envoy proxy servers.

☐ ☆ ✇ Dark Reading:

Symbiote Malware Poses Stealthy, Linux-Based Threat to Financial Industry

A Linux-based banking Trojan is a master at staying under the radar.

☐ ☆ ✇ Dark Reading:

EU Debates AI Act to Protect Human Rights, Define High-Risk Uses

The commission argues that legislative action is needed to ensure a well-functioning market for AI systems that balances benefits and risks.

☐ ☆ ✇ Dark Reading:

Emotet Banking Trojan Resurfaces, Skating Past Email Security

The malware is using spreadsheets, documents, and other types of Microsoft Office attachments in a new and improved version that is often able to bypass email gateway-security scanners.

☐ ☆ ✇ Dark Reading:

Cisco Revamps Cloud Security Strategy With New Secure Access, SASE Portfolio

The company's vision for the future of cloud security is based on simplified, horizontal coverage across multiple cloud platforms.

☐ ☆ ✇ Dark Reading:

Black Basta Ransomware Targets ESXi Servers in Active Campaign

The new ransomware strain Black Basta is now actively targeting VMware ESXi servers in an ongoing campaign, encrypting files inside a targeted volumes folder.

❌