Uncategorized

FTC charges genetic testing organization for privacy concerns

FTC charges genetic testing organization for privacy concerns 16/06/2023 at 21:48 By Genetic testing firm 1Health has been charged by the Federal Trade Commission (FTC) for leaving personal genetic and health data unsecured.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

FTC charges genetic testing organization for privacy concerns Read More »

Airline fraud: Shoring up defense with advanced analytics & MLOps

Airline fraud: Shoring up defense with advanced analytics & MLOps 16/06/2023 at 18:47 By Airlines are experiencing an unprecedented rise in fraudulent claims, not only denting profits but also affecting the customer experience. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Airline fraud: Shoring up defense with advanced analytics & MLOps Read More »

75% of OT organizations had at least 1 intrusion in the last year

75% of OT organizations had at least 1 intrusion in the last year 16/06/2023 at 17:19 By A new report shows three-fourths of operational technology organizations reported at least one intrusion in the last year, with 56% from malware and 49% from phishing. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed

React to this headline:

Loading spinner

75% of OT organizations had at least 1 intrusion in the last year Read More »

ChamelDoH: New Linux Backdoor Utilizing DNS-over-HTTPS Tunneling for Covert CnC

ChamelDoH: New Linux Backdoor Utilizing DNS-over-HTTPS Tunneling for Covert CnC 16/06/2023 at 17:00 By The threat actor known as ChamelGang has been observed using a previously undocumented implant to backdoor Linux systems, marking a new expansion of the threat actor’s capabilities. The malware, dubbed ChamelDoH by Stairwell, is a C++-based tool for communicating via DNS-over-HTTPS (DoH) tunneling. ChamelGang was first

React to this headline:

Loading spinner

ChamelDoH: New Linux Backdoor Utilizing DNS-over-HTTPS Tunneling for Covert CnC Read More »

Best practices for implementing a new security camera system

Best practices for implementing a new security camera system 16/06/2023 at 15:08 By The consequences of a few non-functional cameras can mean a breakdown in the security solution and lead to adverse outcomes such as uncaught criminals or property loss.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source

React to this headline:

Loading spinner

Best practices for implementing a new security camera system Read More »

Activities in the Cybercrime Underground Require a New Approach to Cybersecurity

Activities in the Cybercrime Underground Require a New Approach to Cybersecurity 16/06/2023 at 14:19 By As Threat Actors Continuously Adapt their TTPs in Today’s Threat Landscape, So Must You Earlier this year, threat researchers at Cybersixgill released the annual report, The State of the Cybercrime Underground. The research stems from an analysis of Cybersixgill’s collected intelligence items

React to this headline:

Loading spinner

Activities in the Cybercrime Underground Require a New Approach to Cybersecurity Read More »

20-Year-Old Russian LockBit Ransomware Affiliate Arrested in Arizona

20-Year-Old Russian LockBit Ransomware Affiliate Arrested in Arizona 16/06/2023 at 11:33 By The U.S. Department of Justice (DoJ) on Thursday unveiled charges against a Russian national for his alleged involvement in deploying LockBit ransomware to targets in the U.S., Asia, Europe, and Africa. Ruslan Magomedovich Astamirov, 20, of Chechen Republic has been accused of perpetrating

React to this headline:

Loading spinner

20-Year-Old Russian LockBit Ransomware Affiliate Arrested in Arizona Read More »

Third Flaw Uncovered in MOVEit Transfer App Amidst Cl0p Ransomware Mass Attack

Third Flaw Uncovered in MOVEit Transfer App Amidst Cl0p Ransomware Mass Attack 16/06/2023 at 07:31 By Progress Software on Thursday disclosed a third vulnerability impacting its MOVEit Transfer application, as the Cl0p cybercrime gang deployed extortion tactics against affected companies. The new flaw, which is yet to be assigned a CVE identifier, also concerns an SQL injection vulnerability

React to this headline:

Loading spinner

Third Flaw Uncovered in MOVEit Transfer App Amidst Cl0p Ransomware Mass Attack Read More »

BRIX Holdings utilizes new network and video security measures

BRIX Holdings utilizes new network and video security measures 15/06/2023 at 23:05 By BRIX Holdings has updated network and video security measures. The company will utilize Interface Systems network and video monitoring solutions.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

BRIX Holdings utilizes new network and video security measures Read More »

Ransomware Hackers and Scammers Utilizing Cloud Mining to Launder Cryptocurrency

Ransomware Hackers and Scammers Utilizing Cloud Mining to Launder Cryptocurrency 15/06/2023 at 20:34 By Ransomware actors and cryptocurrency scammers have joined nation-state actors in abusing cloud mining services to launder digital assets, new findings reveal. “Cryptocurrency mining is a crucial part of our industry, but it also holds special appeal to bad actors, as it

React to this headline:

Loading spinner

Ransomware Hackers and Scammers Utilizing Cloud Mining to Launder Cryptocurrency Read More »

Chinese UNC4841 Group Exploits Zero-Day Flaw in Barracuda Email Security Gateway

Chinese UNC4841 Group Exploits Zero-Day Flaw in Barracuda Email Security Gateway 15/06/2023 at 18:47 By A suspected China-nexus threat actor dubbed UNC4841 has been linked to the exploitation of a recently patched zero-day flaw in Barracuda Email Security Gateway (ESG) appliances since October 2022. “UNC4841 is an espionage actor behind this wide-ranging campaign in support

React to this headline:

Loading spinner

Chinese UNC4841 Group Exploits Zero-Day Flaw in Barracuda Email Security Gateway Read More »

CISA releases information on LockBit ransomware

CISA releases information on LockBit ransomware 15/06/2023 at 18:28 By CISA and global agencies released an advisory on LockBit detailing how it operates, the history of its development and common attack techniques. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

CISA releases information on LockBit ransomware Read More »

Public sector application flaws increased in last 12 months

Public sector application flaws increased in last 12 months 15/06/2023 at 17:32 By According to research by Veracode, public sector applications tend to have more flaws and vulnerabilities than private sector applications.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Public sector application flaws increased in last 12 months Read More »

A Cybersecurity (Installation) Odyssey in the South Pacific

A Cybersecurity (Installation) Odyssey in the South Pacific 15/06/2023 at 17:02 By I belong to the Cyber Architecture Integration (CAI) for Trustwave Consulting and Professional Service, Pacific, team and while we dabble in several cybersecurity areas, our primary task is to focus on deploying, configuring, and tuning various cybersecurity tools. This article is an excerpt

React to this headline:

Loading spinner

A Cybersecurity (Installation) Odyssey in the South Pacific Read More »

Vidar Malware Using New Tactics to Evade Detection and Anonymize Activities

Vidar Malware Using New Tactics to Evade Detection and Anonymize Activities 15/06/2023 at 17:01 By The threat actors behind the Vidar malware have made changes to their backend infrastructure, indicating attempts to retool and conceal their online trail in response to public disclosures about their modus operandi. “Vidar threat actors continue to rotate their backend IP infrastructure,

React to this headline:

Loading spinner

Vidar Malware Using New Tactics to Evade Detection and Anonymize Activities Read More »

Brute-forcing ButterflyMX Virtual Keys and Hacking Time Limits

Brute-forcing ButterflyMX Virtual Keys and Hacking Time Limits 15/06/2023 at 16:18 By Recently, I discovered two vulnerabilities in the ButterflyMX system which were responsibly disclosed to the vendor. The vendor has mitigated the highest-risk vulnerability, which enabled unauthorized attackers to gain access to buildings equipped with the ButterflyMX Access Control System. This article is an

React to this headline:

Loading spinner

Brute-forcing ButterflyMX Virtual Keys and Hacking Time Limits Read More »

Securing healthcare data in the era of AI

Securing healthcare data in the era of AI 15/06/2023 at 16:18 By As the healthcare industry embraces the transformative power of AI, it is crucial for healthcare security leaders to understand the associated data security risks. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Securing healthcare data in the era of AI Read More »

AI’s evolving role in strengthening enterprise cybersecurity efforts

AI’s evolving role in strengthening enterprise cybersecurity efforts 15/06/2023 at 16:18 By AI is a crucial component of modern cybersecurity measures, as it increases process efficiency, reduces operational costs and resolves issues related to scaling. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

AI’s evolving role in strengthening enterprise cybersecurity efforts Read More »

Warning: GravityRAT Android Trojan Steals WhatsApp Backups and Deletes Files

Warning: GravityRAT Android Trojan Steals WhatsApp Backups and Deletes Files 15/06/2023 at 16:18 By An updated version of an Android remote access trojan dubbed GravityRAT has been found masquerading as messaging apps BingeChat and Chatico as part of a narrowly targeted campaign since June 2022. “Notable in the newly discovered campaign, GravityRAT can exfiltrate WhatsApp backups and

React to this headline:

Loading spinner

Warning: GravityRAT Android Trojan Steals WhatsApp Backups and Deletes Files Read More »

New Supply Chain Attack Exploits Abandoned S3 Buckets to Distribute Malicious Binaries

New Supply Chain Attack Exploits Abandoned S3 Buckets to Distribute Malicious Binaries 15/06/2023 at 15:15 By In what’s a new kind of software supply chain attack aimed at open source projects, it has emerged that threat actors could seize control of expired Amazon S3 buckets to serve rogue binaries without altering the modules themselves. “Malicious

React to this headline:

Loading spinner

New Supply Chain Attack Exploits Abandoned S3 Buckets to Distribute Malicious Binaries Read More »

Scroll to Top