FreshRSS

πŸ”’
☐ β˜† βœ‡ Threatpost | The first stop for security news

Human Error Blamed for Leak of 1 Billion Records of Chinese Citizens

By Elizabeth Montalbano β€” July 6th 2022 at 10:33
A developer appears to have divulged credentials to a police database on a popular developer forum, leading to a breach and subsequent bid to sell 23 terabytes of personal data on the dark web.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Latest Cyberattack Against Iran Part of Ongoing Campaign

By Nate Nelson β€” July 5th 2022 at 12:35
Iran's steel manufacturing industry is victim to ongoing cyberattacks that previously impacted the country's rail system.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Google Patches Actively Exploited Chrome Bug

By Elizabeth Montalbano β€” July 5th 2022 at 11:54
The heap buffer overflow issue in the browser’s WebRTC engine could allow attackers to execute arbitrary code.
☐ β˜† βœ‡ Threatpost | The first stop for security news

ZuoRAT Can Take Over Widely Used SOHO Routers

By Elizabeth Montalbano β€” June 30th 2022 at 17:20
Devices from Cisco, Netgear and others at risk from the multi-stage malware, which has been active since April 2020 and shows the work of a sophisticated threat actor.
☐ β˜† βœ‡ Threatpost | The first stop for security news

A Guide to Surviving a Ransomware Attack

By Oliver Tavakoli β€” June 30th 2022 at 11:59
Oliver Tavakoli, CTO at Vectra AI, gives us hope that surviving a ransomware attack is possible, so long as we apply preparation and intentionality to our defense posture.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Leaky Access Tokens Exposed Amazon Photos of Users

By Nate Nelson β€” June 29th 2022 at 20:18
Hackers with Amazon users’ authentication tokens could’ve stolen or encrypted personal photos and documents.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Patchable and Preventable Security Issues Lead Causes of Q1 Attacks

By Sagar Tiwari β€” June 29th 2022 at 13:00
Attacks against U.S. companies spike in Q1 2022 with patchable and preventable external vulnerabilities responsible for bulk of attacks.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Top Six Security Bad Habits, and How to Break Them

By Infosec Contributor β€” June 28th 2022 at 13:05
Shrav Mehta, CEO, Secureframe, outlines the top six bad habits security teams need to break to prevent costly breaches, ransomware attacks and prevent phishing-based endpoint attacks.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Mitel VoIP Bug Exploited in Ransomware Attacks

By Sagar Tiwari β€” June 28th 2022 at 12:42
Researchers warn threat actors are using a novel remote code execution exploit to gain initial access to victim’s environments.
☐ β˜† βœ‡ Threatpost | The first stop for security news

β€˜Killnet’ Adversary Pummels Lithuania with DDoS Attacks Over Blockade

By Elizabeth Montalbano β€” June 28th 2022 at 12:17
Cyber collective Killnet claims it won’t let up until the Baltic country opens trade routes to and from the Russian exclave of Kaliningrad.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Log4Shell Vulnerability Targeted in VMware Servers to Exfiltrate Data

By Sagar Tiwari β€” June 28th 2022 at 11:57
CISA warns that threat actors are ramping up attacks against unpatched Log4Shell vulnerability in VMware servers.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Google Warns Spyware Being Deployed Against Android, iOS Users

By Elizabeth Montalbano β€” June 24th 2022 at 11:02
The company is warning victims in Italy and Kazakhstan that they have been targeted by the malware from Italian firm RCS Labs.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug

By Elizabeth Montalbano β€” June 23rd 2022 at 12:21
The APT is pairing a known Microsoft flaw with a malicious document to load malware that nabs credentials from Chrome, Firefox and Edge browsers.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Gamification of Ethical Hacking and Hacking Esports

By Joseph Carson β€” June 22nd 2022 at 12:49
Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea, explores why gamified platforms and hacking esports are the future.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Discovery of 56 OT Device Flaws Blamed on Lackluster Security Culture

By Elizabeth Montalbano β€” June 22nd 2022 at 12:34
Culture of β€˜insecure-by-design’ security is cited in discovery of bug-riddled operational technology devices.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Elusive ToddyCat APT Targets Microsoft Exchange Servers

By Sagar Tiwari β€” June 22nd 2022 at 12:18
The threat actor targets institutions and companies in Europe and Asia.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Modern IT Security Teams’ Inevitable Need for Advanced Vulnerability Management

By Mandy Davenport β€” June 21st 2022 at 15:19
Traditional vulnerability management programs are outdated, with little to no innovation in the last two decades. Today's dynamic IT environment demands an advanced vulnerability management program to deal with the complex attack surface and curb security risks.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Kazakh Govt. Used Spyware Against Protesters

By Nate Nelson β€” June 21st 2022 at 12:48
Researchers have discovered that a Kazakhstan government entity deployed sophisticated Italian spyware within its borders.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Office 365 Config Loophole Opens OneDrive, SharePoint Data to Ransomware Attack

By Sagar Tiwari β€” June 21st 2022 at 12:34
A reported a "potentially dangerous piece of functionality" allows an attacker to launch an attack on cloud infrastructure and ransom files stored in SharePoint and OneDrive.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Voicemail Scam Steals Microsoft Credentials

By Elizabeth Montalbano β€” June 21st 2022 at 11:20
Attackers are targeting a number of key vertical markets in the U.S. with the active campaign, which impersonates the organization and Microsoft to lift Office365 and Outlook log-in details.
☐ β˜† βœ‡ Threatpost | The first stop for security news

China-linked APT Flew Under Radar for Decade

By Nate Nelson β€” June 17th 2022 at 13:34
Evidence suggests that a just-discovered APT has been active since 2013.
☐ β˜† βœ‡ Threatpost | The first stop for security news

State-Sponsored Phishing Attack Targeted Israeli Military Officials

By Nate Nelson β€” June 16th 2022 at 11:59
Analysts have uncovered an Iran-linked APT sending malicious emails to top Israeli government officials.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Ransomware Risk in Healthcare Endangers Patients

By Ryan Witt β€” June 16th 2022 at 11:24
Ryan Witt, Proofpoint's Healthcare Cybersecurity Leader, examines the impact of ransomware on patient care.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Facebook Messenger Scam Duped Millions

By Nate Nelson β€” June 16th 2022 at 10:59
One well crafted phishing message sent via Facebook Messenger ensnared 10 million Facebook users and counting.
☐ β˜† βœ‡ Threatpost | The first stop for security news

DragonForce Gang Unleash Hacks Against Govt. of India

By Nate Nelson β€” June 15th 2022 at 13:59
In response to a comment about the Prophet Mohammed, a hacktivist group in Malaysia has unleashed a wave of cyber attacks in India.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Travel-related Cybercrime Takes Off as Industry Rebounds

By Sagar Tiwari β€” June 15th 2022 at 13:37
Upsurge in the tourism industry after the COVID-19 pandemic grabs the attention of cybercriminals to scam the tourists.
☐ β˜† βœ‡ Threatpost | The first stop for security news

In Cybersecurity, What You Can’t See Can Hurt You

By Sponsored Content β€” June 15th 2022 at 13:00
The dangers to SMBs and businesses of all sizes from cyberattacks are well known. But what’s driving these attacks, and what do cybersecurity stakeholders need to do that they’re not already doing?
☐ β˜† βœ‡ Threatpost | The first stop for security news

Kaiser Permanente Exposes Nearly 70K Medical Records in Data Breach

By Elizabeth Montalbano β€” June 14th 2022 at 11:08
Attackers gained access to private account details through an email compromise incident that occurred in April.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Linux Malware Deemed β€˜Nearly Impossible’ to Detect

By Elizabeth Montalbano β€” June 14th 2022 at 10:55
Symbiote, discovered in November, parasitically infects running processes so it can steal credentials, gain rootlkit functionality and install a backdoor for remote access.
❌