Uncategorized

The Africa factor: A history of geopolitical investment & colonization

The Africa factor: A history of geopolitical investment & colonization 17/05/2023 at 19:51 By In this Cybersecurity & Geopolitical Discussion episode, Phillip Ingram and Ian Thornton-Trump discuss the background and recent events in Africa with guest Lisa Forte from Red Goat Cybersecurity. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View […]

React to this headline:

Loading spinner

The Africa factor: A history of geopolitical investment & colonization Read More »

OilAlpha: Emerging Houthi-linked Cyber Threat Targets Arabian Android Users

OilAlpha: Emerging Houthi-linked Cyber Threat Targets Arabian Android Users 17/05/2023 at 17:17 By A hacking group dubbed OilAlpha with suspected ties to Yemen’s Houthi movement has been linked to a cyber espionage campaign targeting development, humanitarian, media, and non-governmental organizations in the Arabian peninsula. “OilAlpha used encrypted chat messengers like WhatsApp to launch social engineering attacks against its targets,”

React to this headline:

Loading spinner

OilAlpha: Emerging Houthi-linked Cyber Threat Targets Arabian Android Users Read More »

Optimize ID verification for safe, efficient omnichannel experiences

Optimize ID verification for safe, efficient omnichannel experiences 17/05/2023 at 17:04 By Fraud networks are always continuously adjusting and adapting to capitalize on all touchpoints and leverage newer digital norms to their advantage. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Optimize ID verification for safe, efficient omnichannel experiences Read More »

Lea Kissner appointed as Lacework Chief Information Security Officer

Lea Kissner appointed as Lacework Chief Information Security Officer 17/05/2023 at 16:44 By With more than 20 years of security industry experience, Lea Kissner has been named the new Chief Information Security Officer (CISO) at Lacework. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Lea Kissner appointed as Lacework Chief Information Security Officer Read More »

Threat Group UNC3944 Abusing Azure Serial Console for Total VM Takeover

Threat Group UNC3944 Abusing Azure Serial Console for Total VM Takeover 17/05/2023 at 15:36 By A financially motivated cyber actor has been observed abusing Microsoft Azure Serial Console on virtual machines (VMs) to install third-party remote management tools within compromised environments. Google-owned Mandiant attributed the activity to a threat group it tracks under the name UNC3944, which is

React to this headline:

Loading spinner

Threat Group UNC3944 Abusing Azure Serial Console for Total VM Takeover Read More »

Identifying a Patch Management Solution: Overview of Key Criteria

Identifying a Patch Management Solution: Overview of Key Criteria 17/05/2023 at 15:36 By Software is rarely a one-and-done proposition. In fact, any application available today will likely need to be updated – or patched – to fix bugs, address vulnerabilities, and update key features at multiple points in the future. With the typical enterprise relying on

React to this headline:

Loading spinner

Identifying a Patch Management Solution: Overview of Key Criteria Read More »

Serious Unpatched Vulnerability Uncovered in Popular Belkin Wemo Smart Plugs

Serious Unpatched Vulnerability Uncovered in Popular Belkin Wemo Smart Plugs 17/05/2023 at 14:17 By The second generation version of Belkin’s Wemo Mini Smart Plug has been found to contain a buffer overflow vulnerability that could be weaponized by a threat actor to inject arbitrary commands remotely. The issue, assigned the identifier CVE-2023-27217, was discovered and reported

React to this headline:

Loading spinner

Serious Unpatched Vulnerability Uncovered in Popular Belkin Wemo Smart Plugs Read More »

State-Sponsored Sidewinder Hacker Group’s Covert Attack Infrastructure Uncovered

State-Sponsored Sidewinder Hacker Group’s Covert Attack Infrastructure Uncovered 17/05/2023 at 14:17 By Cybersecurity researchers have unearthed previously undocumented attack infrastructure used by the prolific state-sponsored group SideWinder to strike entities located in Pakistan and China. This comprises a network of 55 domains and IP addresses used by the threat actor, cybersecurity companies Group-IB and Bridewell said in

React to this headline:

Loading spinner

State-Sponsored Sidewinder Hacker Group’s Covert Attack Infrastructure Uncovered Read More »

U.S. Offers $10 Million Bounty for Capture of Notorious Russian Ransomware Operator

U.S. Offers $10 Million Bounty for Capture of Notorious Russian Ransomware Operator 17/05/2023 at 08:29 By A Russian national has been charged and indicted by the U.S. Department of Justice (DoJ) for launching ransomware attacks against “thousands of victims” in the country and across the world. Mikhail Pavlovich Matveev (aka Wazawaka, m1x, Boriselcin, and Uhodiransomwar), the 30-year-old

React to this headline:

Loading spinner

U.S. Offers $10 Million Bounty for Capture of Notorious Russian Ransomware Operator Read More »

Holiday season sees 550% increase in unique threats

Holiday season sees 550% increase in unique threats 17/05/2023 at 01:25 By API security was studied in a recent report by Cequence Security based on the analysis of API transactions over the second half of 2022. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Holiday season sees 550% increase in unique threats Read More »

New toolkit aimed to strengthen school safety reporting programs

New toolkit aimed to strengthen school safety reporting programs 17/05/2023 at 01:25 By CISA and the U.S. Secret Service National Threat Assessment Center have released a new resource to help K-12 schools strengthen school safety reporting programs.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this

React to this headline:

Loading spinner

New toolkit aimed to strengthen school safety reporting programs Read More »

U.K. citizen pleads guilty in connection to Twitter hack

U.K. citizen pleads guilty in connection to Twitter hack 16/05/2023 at 21:02 By A U.K. citizen pleaded guilty last week in New York to his role in cyberstalking and other computer hacking schemes, including the July 2020 hack of Twitter. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source

React to this headline:

Loading spinner

U.K. citizen pleads guilty in connection to Twitter hack Read More »

Trustwave Threat Hunt Team Uncovers Healthcare Industry Vulnerabilities

Trustwave Threat Hunt Team Uncovers Healthcare Industry Vulnerabilities 16/05/2023 at 20:10 By The healthcare industry has been struck with a growing number of cyberattacks over the last few months, raising concerns in the healthcare industry and in Washington, D.C. The continued onslaught of attacks has raised the question of how healthcare entities can and should

React to this headline:

Loading spinner

Trustwave Threat Hunt Team Uncovers Healthcare Industry Vulnerabilities Read More »

USPS new safety measures aim to improve employee safety

USPS new safety measures aim to improve employee safety 16/05/2023 at 20:09 By USPS plans to better protect employees and prevent mail theft. USPS workers can be the target of crime as they have access to a variety of buildings. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source

React to this headline:

Loading spinner

USPS new safety measures aim to improve employee safety Read More »

China’s Mustang Panda Hackers Exploit TP-Link Routers for Persistent Attacks

China’s Mustang Panda Hackers Exploit TP-Link Routers for Persistent Attacks 16/05/2023 at 20:09 By The Chinese nation-state actor known as Mustang Panda has been linked to a new set of sophisticated and targeted attacks aimed at European foreign affairs entities since January 2023. An analysis of these intrusions, per Check Point researchers Itay Cohen and Radoslaw Madej,

React to this headline:

Loading spinner

China’s Mustang Panda Hackers Exploit TP-Link Routers for Persistent Attacks Read More »

Abusing Time-Of-Check Time-Of-Use (TOCTOU) Race Condition Vulnerabilities in Games, Harry Potter Style

Abusing Time-Of-Check Time-Of-Use (TOCTOU) Race Condition Vulnerabilities in Games, Harry Potter Style 16/05/2023 at 17:48 By I feel I need to clarify, for legal reasons, that this is nothing to do with any Harry Potter game. The reference is made because we are dealing with spells and magic, and I mean magic in the literal

React to this headline:

Loading spinner

Abusing Time-Of-Check Time-Of-Use (TOCTOU) Race Condition Vulnerabilities in Games, Harry Potter Style Read More »

Inside Qilin Ransomware: Affiliates Take Home 85% of Ransom Payouts

Inside Qilin Ransomware: Affiliates Take Home 85% of Ransom Payouts 16/05/2023 at 16:18 By Ransomware affiliates associated with the Qilin ransomware-as-a-service (RaaS) scheme earn anywhere between 80% to 85% of the ransom payments, according to new findings from Group-IB. The cybersecurity firm said it was able to infiltrate the group in March 2023, uncovering details

React to this headline:

Loading spinner

Inside Qilin Ransomware: Affiliates Take Home 85% of Ransom Payouts Read More »

CopperStealer Malware Crew Resurfaces with New Rootkit and Phishing Kit Modules

CopperStealer Malware Crew Resurfaces with New Rootkit and Phishing Kit Modules 16/05/2023 at 16:09 By The threat actors behind the CopperStealer malware resurfaced with two new campaigns in March and April 2023 that are designed to deliver two novel payloads dubbed CopperStealth and CopperPhish. Trend Micro is tracking the financially motivated group under the name Water

React to this headline:

Loading spinner

CopperStealer Malware Crew Resurfaces with New Rootkit and Phishing Kit Modules Read More »

Scroll to Top