Uncategorized

How to Reduce Exposure on the Manufacturing Attack Surface

How to Reduce Exposure on the Manufacturing Attack Surface 18/05/2023 at 13:47 By Digitalization initiatives are connecting once-isolated Operational Technology (OT) environments with their Information Technology (IT) counterparts. This digital transformation of the factory floor has accelerated the connection of machinery to digital systems and data. Computer systems for managing and monitoring digital systems and […]

React to this headline:

Loading spinner

How to Reduce Exposure on the Manufacturing Attack Surface Read More »

8220 Gang Exploiting Oracle WebLogic Flaw to Hijack Servers and Mine Cryptocurrency

8220 Gang Exploiting Oracle WebLogic Flaw to Hijack Servers and Mine Cryptocurrency 18/05/2023 at 13:00 By The notorious cryptojacking group tracked as 8220 Gang has been spotted weaponizing a six-year-old security flaw in Oracle WebLogic servers to ensnare vulnerable instances into a botnet and distribute cryptocurrency mining malware. The flaw in question is CVE-2017-3506 (CVSS score: 7.4), which, when

React to this headline:

Loading spinner

8220 Gang Exploiting Oracle WebLogic Flaw to Hijack Servers and Mine Cryptocurrency Read More »

Escalating China-Taiwan Tensions Fuel Alarming Surge in Cyber Attacks

Escalating China-Taiwan Tensions Fuel Alarming Surge in Cyber Attacks 18/05/2023 at 13:00 By The rising geopolitical tensions between China and Taiwan in recent months have sparked a noticeable uptick in cyber attacks on the East Asian island country. “From malicious emails and URLs to malware, the strain between China’s claim of Taiwan as part of its territory and

React to this headline:

Loading spinner

Escalating China-Taiwan Tensions Fuel Alarming Surge in Cyber Attacks Read More »

Darknet Carding Kingpin Pleads Guilty: Sold Financial Info of Tens of Thousands

Darknet Carding Kingpin Pleads Guilty: Sold Financial Info of Tens of Thousands 18/05/2023 at 10:04 By A U.S. national has pleaded guilty in a Missouri court to operating a darknet carding site and selling financial information belonging to tens of thousands of victims in the country. Michael D. Mihalo, aka Dale Michael Mihalo Jr. and

React to this headline:

Loading spinner

Darknet Carding Kingpin Pleads Guilty: Sold Financial Info of Tens of Thousands Read More »

Apple Thwarts $2 Billion in App Store Fraud, Rejects 1.7 Million App Submissions

Apple Thwarts $2 Billion in App Store Fraud, Rejects 1.7 Million App Submissions 18/05/2023 at 10:04 By Apple has announced that it prevented over $2 billion in potentially fraudulent transactions and rejected roughly 1.7 million app submissions for privacy and security violations in 2022. The computing giant said it terminated 428,000 developer accounts for potential

React to this headline:

Loading spinner

Apple Thwarts $2 Billion in App Store Fraud, Rejects 1.7 Million App Submissions Read More »

Critical Flaws in Cisco Small Business Switches Could Allow Remote Attacks

Critical Flaws in Cisco Small Business Switches Could Allow Remote Attacks 18/05/2023 at 09:07 By Cisco has released updates to address a set of nine security flaws in its Small Business Series Switches that could be exploited by an unauthenticated, remote attacker to run arbitrary code or cause a denial-of-service (DoS) condition. “These vulnerabilities are

React to this headline:

Loading spinner

Critical Flaws in Cisco Small Business Switches Could Allow Remote Attacks Read More »

Georgia facilities cited for hazardous material violations

Georgia facilities cited for hazardous material violations 17/05/2023 at 23:42 By OSHA cited two Georgia facilities for exposing employees to hazardous materials after screening tests found workers had elevated levels of arsenic. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Georgia facilities cited for hazardous material violations Read More »

Social media was 72% of non-government or financial account abuse

Social media was 72% of non-government or financial account abuse 17/05/2023 at 23:42 By A report found identity thieves are better at using social engineering to convince people to share personal, financial and business information. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Social media was 72% of non-government or financial account abuse Read More »

32% of organizations say they’re effective at mitigating cyber threats

32% of organizations say they’re effective at mitigating cyber threats 17/05/2023 at 23:42 By A report reveals an increase in cyberattacks and evolving threat landscape are resulting in more organizations building long-term cyber resilience. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

32% of organizations say they’re effective at mitigating cyber threats Read More »

Report: Carpet bomb DDoS attacks rise 300% in 2022

Report: Carpet bomb DDoS attacks rise 300% in 2022 17/05/2023 at 22:43 By A new report released by Corero Network Security reveals carpet bomb distributed denial of service (DDoS) attacks increased 300% in 2022. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Report: Carpet bomb DDoS attacks rise 300% in 2022 Read More »

The Africa factor: A history of geopolitical investment & colonization

The Africa factor: A history of geopolitical investment & colonization 17/05/2023 at 19:51 By In this Cybersecurity & Geopolitical Discussion episode, Phillip Ingram and Ian Thornton-Trump discuss the background and recent events in Africa with guest Lisa Forte from Red Goat Cybersecurity. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View

React to this headline:

Loading spinner

The Africa factor: A history of geopolitical investment & colonization Read More »

OilAlpha: Emerging Houthi-linked Cyber Threat Targets Arabian Android Users

OilAlpha: Emerging Houthi-linked Cyber Threat Targets Arabian Android Users 17/05/2023 at 17:17 By A hacking group dubbed OilAlpha with suspected ties to Yemen’s Houthi movement has been linked to a cyber espionage campaign targeting development, humanitarian, media, and non-governmental organizations in the Arabian peninsula. “OilAlpha used encrypted chat messengers like WhatsApp to launch social engineering attacks against its targets,”

React to this headline:

Loading spinner

OilAlpha: Emerging Houthi-linked Cyber Threat Targets Arabian Android Users Read More »

Optimize ID verification for safe, efficient omnichannel experiences

Optimize ID verification for safe, efficient omnichannel experiences 17/05/2023 at 17:04 By Fraud networks are always continuously adjusting and adapting to capitalize on all touchpoints and leverage newer digital norms to their advantage. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Optimize ID verification for safe, efficient omnichannel experiences Read More »

Lea Kissner appointed as Lacework Chief Information Security Officer

Lea Kissner appointed as Lacework Chief Information Security Officer 17/05/2023 at 16:44 By With more than 20 years of security industry experience, Lea Kissner has been named the new Chief Information Security Officer (CISO) at Lacework. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Lea Kissner appointed as Lacework Chief Information Security Officer Read More »

Threat Group UNC3944 Abusing Azure Serial Console for Total VM Takeover

Threat Group UNC3944 Abusing Azure Serial Console for Total VM Takeover 17/05/2023 at 15:36 By A financially motivated cyber actor has been observed abusing Microsoft Azure Serial Console on virtual machines (VMs) to install third-party remote management tools within compromised environments. Google-owned Mandiant attributed the activity to a threat group it tracks under the name UNC3944, which is

React to this headline:

Loading spinner

Threat Group UNC3944 Abusing Azure Serial Console for Total VM Takeover Read More »

Identifying a Patch Management Solution: Overview of Key Criteria

Identifying a Patch Management Solution: Overview of Key Criteria 17/05/2023 at 15:36 By Software is rarely a one-and-done proposition. In fact, any application available today will likely need to be updated – or patched – to fix bugs, address vulnerabilities, and update key features at multiple points in the future. With the typical enterprise relying on

React to this headline:

Loading spinner

Identifying a Patch Management Solution: Overview of Key Criteria Read More »

Serious Unpatched Vulnerability Uncovered in Popular Belkin Wemo Smart Plugs

Serious Unpatched Vulnerability Uncovered in Popular Belkin Wemo Smart Plugs 17/05/2023 at 14:17 By The second generation version of Belkin’s Wemo Mini Smart Plug has been found to contain a buffer overflow vulnerability that could be weaponized by a threat actor to inject arbitrary commands remotely. The issue, assigned the identifier CVE-2023-27217, was discovered and reported

React to this headline:

Loading spinner

Serious Unpatched Vulnerability Uncovered in Popular Belkin Wemo Smart Plugs Read More »

State-Sponsored Sidewinder Hacker Group’s Covert Attack Infrastructure Uncovered

State-Sponsored Sidewinder Hacker Group’s Covert Attack Infrastructure Uncovered 17/05/2023 at 14:17 By Cybersecurity researchers have unearthed previously undocumented attack infrastructure used by the prolific state-sponsored group SideWinder to strike entities located in Pakistan and China. This comprises a network of 55 domains and IP addresses used by the threat actor, cybersecurity companies Group-IB and Bridewell said in

React to this headline:

Loading spinner

State-Sponsored Sidewinder Hacker Group’s Covert Attack Infrastructure Uncovered Read More »

U.S. Offers $10 Million Bounty for Capture of Notorious Russian Ransomware Operator

U.S. Offers $10 Million Bounty for Capture of Notorious Russian Ransomware Operator 17/05/2023 at 08:29 By A Russian national has been charged and indicted by the U.S. Department of Justice (DoJ) for launching ransomware attacks against “thousands of victims” in the country and across the world. Mikhail Pavlovich Matveev (aka Wazawaka, m1x, Boriselcin, and Uhodiransomwar), the 30-year-old

React to this headline:

Loading spinner

U.S. Offers $10 Million Bounty for Capture of Notorious Russian Ransomware Operator Read More »

Scroll to Top