FreshRSS

🔒
☐ ☆ ✇ The Register - Security

185K people's sensitive data in the pits after ransomware raid on Cherry Health

April 18th 2024 at 14:00

Extent of information seized will be a concern for those affected

Ransomware strikes at yet another US healthcare organization led to the theft of sensitive data belonging to just shy of 185,000 people.…

☐ ☆ ✇ The Register - Security

EU tells Meta it can't paywall privacy

April 18th 2024 at 12:19

Platforms should not confront users with 'binary choice' over personal data use

The EU's Data Protection Board (EDPB) has told large online platforms they should not offer users a binary choice between paying for a service and consenting to their personal data being used to provide targeted advertising.…

☐ ☆ ✇ WIRED

The Real-Time Deepfake Romance Scams Have Arrived

By Matt Burgess — April 18th 2024 at 11:00
Watch how smooth-talking scammers known as “Yahoo Boys” use widely available face-swapping tech to carry out elaborate romance scams.
☐ ☆ ✇ The Register - Security

Prolific phishing-made-easy emporium LabHost knocked offline in cyber-cop op

April 18th 2024 at 10:15

Police emit Spotify Wrapped-style videos to let crims know they're being hunted

Feature Cops have brought down a dark-web souk that provided cyber criminals with convincing copies of trusted brands' websites for use in phishing campaigns.…

☐ ☆ ✇ The Register - Security

Cisco creates architecture to improve security and sell you new switches

April 18th 2024 at 07:01

Hypershield detects bad behavior and automagically reconfigures networks to snuff out threats

Cisco has developed a product called Hypershield that it thinks represents a new way to do network security.…

☐ ☆ ✇ The Hacker News

OfflRouter Malware Evades Detection in Ukraine for Almost a Decade

By Newsroom — April 18th 2024 at 14:25
Select Ukrainian government networks have remained infected with a malware called OfflRouter since 2015. Cisco Talos said its findings are based on an analysis of over 100 confidential documents that were infected with the VBA macro virus and uploaded to the VirusTotal malware scanning platform since 2018. More than 20 such documents have been uploaded since 2022. "The documents contained VBA
☐ ☆ ✇ The Hacker News

FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor

By Newsroom — April 18th 2024 at 13:58
The infamous cybercrime syndicate known as FIN7 has been linked to a spear-phishing campaign targeting the U.S. automotive industry to deliver a known backdoor called Carbanak (aka Anunak). "FIN7 identified employees at the company who worked in the IT department and had higher levels of administrative rights," the BlackBerry research and intelligence team said in a new write-up. "They
☐ ☆ ✇ The Hacker News

Recover from Ransomware in 5 Minutes—We will Teach You How!

By The Hacker News — April 18th 2024 at 11:17
Super Low RPO with Continuous Data Protection:Dial Back to Just Seconds Before an Attack Zerto, a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time. This solution leverages continuous data protection (CDP) to ensure all workloads have the lowest recovery point objective (RPO) possible. The most valuable thing about CDP is that it does not use
☐ ☆ ✇ The Hacker News

New Android Trojan 'SoumniBot' Evades Detection with Clever Tricks

By Newsroom — April 18th 2024 at 10:31
A new Android trojan called SoumniBot has been detected in the wild targeting users in South Korea by leveraging weaknesses in the manifest extraction and parsing procedure. The malware is "notable for an unconventional approach to evading analysis and detection, namely obfuscation of the Android manifest," Kaspersky researcher Dmitry Kalinin said in a technical analysis.
☐ ☆ ✇ The Hacker News

How to Conduct Advanced Static Analysis in a Malware Sandbox

By The Hacker News — April 18th 2024 at 10:31
Sandboxes are synonymous with dynamic malware analysis. They help to execute malicious files in a safe virtual environment and observe their behavior. However, they also offer plenty of value in terms of static analysis. See these five scenarios where a sandbox can prove to be a useful tool in your investigations. Detecting Threats in PDFs PDF files are frequently exploited by threat actors to
☐ ☆ ✇ The Hacker News

Global Police Operation Disrupts 'LabHost' Phishing Service, Over 30 Arrested Worldwide

By Newsroom — April 18th 2024 at 10:28
As many as 37 individuals have been arrested as part of an international crackdown on a cybercrime service called LabHost that has been used by criminal actors to steal personal credentials from victims around the world. Described as one of the largest Phishing-as-a-Service (PhaaS) providers, LabHost offered phishing pages targeting banks, high-profile organizations, and other service
☐ ☆ ✇ Security – Cisco Blog

Cisco Hypershield: A New Era of Distributed, AI-Native Security

By Tom Gillis — April 18th 2024 at 06:55

AI is transformative, driving huge productivity gains. The engine of AI — the data center — will grow substantially, maybe an order of magnitude or more over the coming years.

The industry went thr… Read more on Cisco Blogs

☐ ☆ ✇ Security – Cisco Blog

Cisco Hypershield: Reimagining Security

By Craig Connors — April 18th 2024 at 06:55
Cisco Hypershield is a new security infrastructure — a fabric — that can autonomously create defenses and produce measured responses to detected attacks, making security defenders' jobs easier.
☐ ☆ ✇ The Register - Security

Singapore infosec boss warns China/West tech split will be bad for interoperability

April 18th 2024 at 05:32

When you decide not to trust a big chunk of the supply chain, tech (and trade) get harder

One of the biggest challenges Singapore faces is the potential for a split between tech stacks developed and used by China and the West, according to the island nation's Cyber Security Administration (CSA) chief executive David Koh.…

☐ ☆ ✇ The Register - Security

Taiwanese film studio snaps up Chinese surveillance camera specialist Dahua

April 18th 2024 at 03:30

Stymied by sanctions, it had to go … but where?

Chinese surveillance camera manufacturer Zhejiang Dahua Technology, which has found itself on the USA’s entity list of banned orgs, has fully sold off its stateside subsidiary for $15 million to Taiwan's Central Motion Picture Corporation, according to the firm's annual report released on Monday.…

☐ ☆ ✇ The Register - Security

Hugely expanded Section 702 surveillance powers set for US Senate vote

April 17th 2024 at 23:44

Opponents warn almost anyone could be asked to share info with Uncle Sam

On Thursday the US Senate is expected to reauthorize the contentious warrantless surveillance powers conferred by Section 702 of the Foreign Intelligence Surveillance Act (FISA), and may even strengthen them with language that, according to US Senator Ron Wyden (D-OR), "will force a huge range of companies and individuals to spy for the government."…

☐ ☆ ✇ The Register - Security

Kremlin's Sandworm blamed for cyberattacks on US, European water utilities

April 17th 2024 at 19:56

Water tank overflowed during one system malfunction, says Mandiant

The Russian military's notorious Sandworm crew was likely behind cyberattacks on US and European water plants that, in at least one case, caused a tank to overflow.…

☐ ☆ ✇ The Hacker News

Hackers Exploit OpenMetadata Flaws to Mine Crypto on Kubernetes

By Newsroom — April 18th 2024 at 05:54
Threat actors are actively exploiting critical vulnerabilities in OpenMetadata to gain unauthorized access to Kubernetes workloads and leverage them for cryptocurrency mining activity. That's according to the Microsoft Threat Intelligence team, which said the flaws have been weaponized since the start of April 2024. OpenMetadata is an open-source platform that operates as a
☐ ☆ ✇ The Hacker News

Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor

By Newsroom — April 18th 2024 at 04:48
A new Google malvertising campaign is leveraging a cluster of domains mimicking a legitimate IP scanner software to deliver a previously unknown backdoor dubbed MadMxShell. "The threat actor registered multiple look-alike domains using a typosquatting technique and leveraged Google Ads to push these domains to the top of search engine results targeting specific search keywords, thereby
☐ ☆ ✇ WIRED

Big Tech Says Spy Bill Turns Its Workers Into Informants

By Dell Cameron — April 17th 2024 at 18:11
One of Silicon Valley’s most influential lobbying arms joins privacy reformers in a fight against the Biden administration–backed expansion of a major US surveillance program.
☐ ☆ ✇ The Register - Security

Exploit code for Palo Alto Networks zero-day now public

April 17th 2024 at 13:30

Race on to patch as researchers warn of mass exploitation of directory traversal bug

Various infosec researchers have released proof-of-concept (PoC) exploits for the maximum-severity vulnerability in Palo Alto Networks' PAN-OS used in GlobalProtect gateways.…

☐ ☆ ✇ The Register - Security

OpenAI's GPT-4 can exploit real vulnerabilities by reading security advisories

April 17th 2024 at 10:15

While some other LLMs appear to flat-out suck

AI agents, which combine large language models with automation software, can successfully exploit real world security vulnerabilities by reading security advisories, academics have claimed.…

☐ ☆ ✇ WIRED

Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities

By Andy Greenberg — April 17th 2024 at 10:00
Cyber Army of Russia Reborn, a group with ties to the Kremlin’s Sandworm unit, is crossing lines even that notorious cyberwarfare unit wouldn’t dare to.
☐ ☆ ✇ The Register - Security

Japanese government rejects Yahoo! infosec improvement plan

April 17th 2024 at 05:44

Just doesn't believe it will sort out the mess that saw data leak from LINE messaging app

Japan's government has considered the proposed security improvements developed by Yahoo!, found them wanting, and ordered the onetime web giant to take new measures.…

☐ ☆ ✇ The Hacker News

Russian APT Deploys New 'Kapeka' Backdoor in Eastern European Attacks

By Newsroom — April 17th 2024 at 13:32
A previously undocumented "flexible" backdoor called Kapeka has been "sporadically" observed in cyber attacks targeting Eastern Europe, including Estonia and Ukraine, since at least mid-2022. The findings come from Finnish cybersecurity firm WithSecure, which attributed the malware to the Russia-linked advanced persistent threat (APT) group tracked as Sandworm (aka APT44 or
☐ ☆ ✇ Security – Cisco Blog

Supercharging Cisco XDR with AI and Identity Intelligence at RSAC 2024

By Teresa Brunner — April 17th 2024 at 12:00

Cisco XDR is a leader in providing comprehensive threat detection and response across the entire attack surface. We’ll be showcasing new capabilities that will give security teams even more insight, a… Read more on Cisco Blogs

☐ ☆ ✇ The Hacker News

GenAI: A New Headache for SaaS Security Teams

By The Hacker News — April 17th 2024 at 11:07
The introduction of Open AI’s ChatGPT was a defining moment for the software industry, touching off a GenAI race with its November 2022 release. SaaS vendors are now rushing to upgrade tools with enhanced productivity capabilities that are driven by generative AI. Among a wide range of uses, GenAI tools make it easier for developers to build software, assist sales teams in mundane email writing,
☐ ☆ ✇ The Hacker News

Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware

By Newsroom — April 17th 2024 at 10:57
Threat actors are exploiting unpatched Atlassian servers to deploy a Linux variant of Cerber (aka C3RB3R) ransomware. The attacks leverage CVE-2023-22518 (CVSS score: 9.1), a critical security vulnerability impacting the Atlassian Confluence Data Center and Server that allows an unauthenticated attacker to reset Confluence and create an administrator account. Armed with this access, a
☐ ☆ ✇ The Hacker News

Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign

By Newsroom — April 17th 2024 at 10:23
Cybersecurity researchers have discovered a new campaign that's exploiting a recently disclosed security flaw in Fortinet FortiClient EMS devices to deliver ScreenConnect and Metasploit Powerfun payloads. The activity entails the exploitation of CVE-2023-48788 (CVSS score: 9.3), a critical SQL injection flaw that could permit an unauthenticated attacker to execute unauthorized code or
☐ ☆ ✇ The Hacker News

Cisco Warns of Global Surge in Brute-Force Attacks Targeting VPN and SSH Services

By Newsroom — April 17th 2024 at 08:38
Cisco is warning about a global surge in brute-force attacks targeting various devices, including Virtual Private Network (VPN) services, web application authentication interfaces, and SSH services, since at least March 18, 2024. "These attacks all appear to be originating from TOR exit nodes and a range of other anonymizing tunnels and proxies," Cisco Talos said. Successful attacks could
☐ ☆ ✇ The Register - Security

Fire in the Cisco! Networking giant's Duo MFA message logs stolen in phish attack

April 17th 2024 at 00:06

Also warns of brute force attacks targeting its own VPNs, Check Point, Fortinet, SonicWall and more

Cisco is fighting fires on a couple cybersecurity fronts this week involving its Duo multi-factor authentication (MFA) service and its remote-access VPN services.…

☐ ☆ ✇ The Register - Security

MGM says FTC can't possibly probe its ransomware downfall – watchdog chief Lina Khan was a guest at the time

April 16th 2024 at 20:32

What a twist!

MGM Resorts wants the FTC to halt a probe into last year's ransomware infection at the mega casino chain – because the watchdog's boss Lina Khan was a guest at one of its hotels during the cyberattack.…

☐ ☆ ✇ WIRED

Change Healthcare’s New Ransomware Nightmare Goes From Bad to Worse

By Eric Geller — April 16th 2024 at 19:09
A cybercriminal gang called RansomHub claims to be selling highly sensitive patient information stolen from Change Healthcare following a ransomware attack by another group in February.
☐ ☆ ✇ WIRED

US Senate to Vote on a Wiretap Bill That Critics Call ‘Stasi-Like’

By Dell Cameron — April 16th 2024 at 17:02
A controversial bill reauthorizing the Section 702 spy program may force whole new categories of businesses to eavesdrop on the US government’s behalf, including on fellow Americans.
☐ ☆ ✇ The Register - Security

Alleged cryptojacker accused of stealing $3.5M from cloud to mine under $1M in crypto

April 16th 2024 at 16:31

No prizes for guessing the victims

A Nebraska man will appear in court today to face charges related to allegations that he defrauded cloud service providers of more than $3.5 million in a long-running cryptojacking scheme.…

☐ ☆ ✇ The Register - Security

SIM swap crooks solicit T-Mobile US, Verizon staff via text to do their dirty work

April 16th 2024 at 15:30

No breach responsible for employee contact info getting out, says T-Mo

T-Mobile US employees say they are being sent text messages that offer them cash to perform illegal SIM swaps for supposed criminals.…

☐ ☆ ✇ The Register - Security

Open sourcerers say suspected xz-style attacks continue to target maintainers

April 16th 2024 at 14:07

Social engineering patterns spotted across range of popular projects

Open source groups are warning the community about a wave of ongoing attacks targeting project maintainers similar to those that led to the recent attempted backdooring of a core Linux library.…

❌