Uncategorized

Alert: Brazilian Hackers Targeting Users of Over 30 Portuguese Banks

Alert: Brazilian Hackers Targeting Users of Over 30 Portuguese Banks 25/05/2023 at 14:48 By A Brazilian threat actor is targeting Portuguese financial institutions with information-stealing malware as part of a long-running campaign that commenced in 2021. “The attackers can steal credentials and exfiltrate users’ data and personal information, which can be leveraged for malicious activities […]

React to this headline:

Loading spinner

Alert: Brazilian Hackers Targeting Users of Over 30 Portuguese Banks Read More »

Buhti Ransomware Gang Switches Tactics, Utilizes Leaked LockBit and Babuk Code

Buhti Ransomware Gang Switches Tactics, Utilizes Leaked LockBit and Babuk Code 25/05/2023 at 14:48 By The threat actors behind the nascent Buhti ransomware have eschewed their custom payload in favor of leaked LockBit and Babuk ransomware families to strike Windows and Linux systems. “While the group doesn’t develop its own ransomware, it does utilize what appears to

React to this headline:

Loading spinner

Buhti Ransomware Gang Switches Tactics, Utilizes Leaked LockBit and Babuk Code Read More »

China’s Stealthy Hackers Infiltrate U.S. and Guam Critical Infrastructure Undetected

China’s Stealthy Hackers Infiltrate U.S. and Guam Critical Infrastructure Undetected 25/05/2023 at 12:19 By A stealthy China-based group managed to establish a persistent foothold into critical infrastructure organizations in the U.S. and Guam without being detected, Microsoft and the “Five Eyes” nations said on Wednesday. The tech giant’s threat intelligence team is tracking the activity, which includes post-compromise credential

React to this headline:

Loading spinner

China’s Stealthy Hackers Infiltrate U.S. and Guam Critical Infrastructure Undetected Read More »

GUAC 0.1 Beta: Google’s Breakthrough Framework for Secure Software Supply Chains

GUAC 0.1 Beta: Google’s Breakthrough Framework for Secure Software Supply Chains 25/05/2023 at 09:59 By Google on Wednesday announced the 0.1 Beta version of GUAC (short for Graph for Understanding Artifact Composition) for organizations to secure their software supply chains. To that end, the search giant is making available the open source framework as an API for developers to integrate their

React to this headline:

Loading spinner

GUAC 0.1 Beta: Google’s Breakthrough Framework for Secure Software Supply Chains Read More »

Iranian Agrius Hackers Targeting Israeli Organizations with Moneybird Ransomware

Iranian Agrius Hackers Targeting Israeli Organizations with Moneybird Ransomware 25/05/2023 at 09:59 By The Iranian threat actor known as Agrius is leveraging a new ransomware strain called Moneybird in its attacks targeting Israeli organizations. Agrius, also known as Pink Sandstorm (formerly Americium), has a track record of staging destructive data-wiping attacks aimed at Israel under the guise of ransomware

React to this headline:

Loading spinner

Iranian Agrius Hackers Targeting Israeli Organizations with Moneybird Ransomware Read More »

Ransomware is being excluded from cyber insurance policies

Ransomware is being excluded from cyber insurance policies 24/05/2023 at 22:24 By According to a recent report, some cyber insurance policies aren’t covering ransomware attacks as the volume of attacks continues to rise. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Ransomware is being excluded from cyber insurance policies Read More »

Iranian Tortoiseshell Hackers Targeting Israeli Logistics Industry

Iranian Tortoiseshell Hackers Targeting Israeli Logistics Industry 24/05/2023 at 18:26 By At least eight websites associated with shipping, logistics, and financial services companies in Israel were targeted as part of a watering hole attack. Tel Aviv-based cybersecurity company ClearSky attributed the attacks with low confidence to an Iranian threat actor tracked as Tortoiseshell, which is also

React to this headline:

Loading spinner

Iranian Tortoiseshell Hackers Targeting Israeli Logistics Industry Read More »

Improving IT security through cross-department collaboration

Improving IT security through cross-department collaboration 24/05/2023 at 17:24 By By having developer and security teams work together at the start of a project, security measures can be integrated in real-time saving both teams time and frustration.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this

React to this headline:

Loading spinner

Improving IT security through cross-department collaboration Read More »

Hear From Children’s National Hospital and Trustwave at Gartner Security & Risk Management 2023

Hear From Children’s National Hospital and Trustwave at Gartner Security & Risk Management 2023 24/05/2023 at 16:43 By If you’re heading to Gartner Security & Risk Management 2023 in National Harbor, MD, mark your calendar for a compelling session from Children’s National Hospital and Trustwave. This article is an excerpt from Trustwave Blog View Original

React to this headline:

Loading spinner

Hear From Children’s National Hospital and Trustwave at Gartner Security & Risk Management 2023 Read More »

Microsoft Encrypted Restricted Permission Messages Deliver Phishing

Microsoft Encrypted Restricted Permission Messages Deliver Phishing 24/05/2023 at 16:43 By Over the past few days, we have seen phishing attacks that use a combination of compromised Microsoft 365 accounts and .rpmsg encrypted emails to deliver the phishing message. This article is an excerpt from SpiderLabs Blog from Trustwave View Original Source React to this

React to this headline:

Loading spinner

Microsoft Encrypted Restricted Permission Messages Deliver Phishing Read More »

79% of organizations expect ransomware attacks this year

79% of organizations expect ransomware attacks this year 24/05/2023 at 15:51 By A new report reveals that a majority of organizations believe that a ransomware attack is moderately to extremely likely to occur within the next 12 months. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to

React to this headline:

Loading spinner

79% of organizations expect ransomware attacks this year Read More »

Data Stealing Malware Discovered in Popular Android Screen Recorder App

Data Stealing Malware Discovered in Popular Android Screen Recorder App 24/05/2023 at 14:34 By Google has removed a screen recording app named “iRecorder – Screen Recorder” from the Play Store after it was found to sneak in information stealing capabilities nearly a year after the app was published as an innocuous app. The app (APK

React to this headline:

Loading spinner

Data Stealing Malware Discovered in Popular Android Screen Recorder App Read More »

What to Look for When Selecting a Static Application Security Testing (SAST) Solution

What to Look for When Selecting a Static Application Security Testing (SAST) Solution 24/05/2023 at 14:34 By If you’re involved in securing the applications your organization develops, there is no question that Static Application Security Testing (SAST) solutions are an important part of a comprehensive application security strategy. SAST secures software, supports business more securely,

React to this headline:

Loading spinner

What to Look for When Selecting a Static Application Security Testing (SAST) Solution Read More »

Legion Malware Upgraded to Target SSH Servers and AWS Credentials

Legion Malware Upgraded to Target SSH Servers and AWS Credentials 24/05/2023 at 14:34 By An updated version of the commodity malware called Legion comes with expanded features to compromise SSH servers and Amazon Web Services (AWS) credentials associated with DynamoDB and CloudWatch. “This recent update demonstrates a widening of scope, with new capabilities such the

React to this headline:

Loading spinner

Legion Malware Upgraded to Target SSH Servers and AWS Credentials Read More »

Cyber Attacks Strike Ukraine’s State Bodies in Espionage Operation

Cyber Attacks Strike Ukraine’s State Bodies in Espionage Operation 24/05/2023 at 11:16 By The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting state bodies in the country as part of an espionage campaign. The intrusion set, attributed to a threat actor tracked by the authority as UAC-0063 since 2021, leverages phishing

React to this headline:

Loading spinner

Cyber Attacks Strike Ukraine’s State Bodies in Espionage Operation Read More »

N. Korean Lazarus Group Targets Microsoft IIS Servers to Deploy Espionage Malware

N. Korean Lazarus Group Targets Microsoft IIS Servers to Deploy Espionage Malware 24/05/2023 at 11:16 By The infamous Lazarus Group actor has been targeting vulnerable versions of Microsoft Internet Information Services (IIS) servers as an initial breach route to deploy malware on targeted systems. The findings come from the AhnLab Security Emergency response Center (ASEC),

React to this headline:

Loading spinner

N. Korean Lazarus Group Targets Microsoft IIS Servers to Deploy Espionage Malware Read More »

Industrial sector faced highest number of ransomware attacks in April

Industrial sector faced highest number of ransomware attacks in April 23/05/2023 at 21:18 By The volume of ransomware attacks remained high with 352 attacks in April, the second-highest month on record, according to a recent report. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Industrial sector faced highest number of ransomware attacks in April Read More »

Scroll to Top