News
-
"Bronze Starlight Targets the Southeast Asian Gambling Sector"SentinelOne observed Bronze Starlight, also known as APT10, Emperor Dragonfly, and Storm-0401, an Advanced Persistent Threat (APT) group with ties to China, targeting the Southeast Asian gambling sector. The malware and infrastructure used in the…
-
"Jenkins Patches High-Severity Vulnerabilities in Multiple Plugins"Open source software development automation server Jenkins recently announced patches for high and medium severity vulnerabilities impacting multiple plugins. The patches address three high severity cross-site request forgery (CSRF) and cross-site…
-
"New BlackCat Ransomware Variant Adopts Advanced Impacket and RemCom Tools"Microsoft disclosed a new variant of the BlackCat ransomware, also known as ALPHV and Noberus, which incorporates tools such as Impacket and RemCom to facilitate lateral movement and Remote Code Execution (RCE). The Impacket tool has modules for…
-
"Researchers Trick an iPhone Into Faking Airplane Mode"Researchers have discovered how to manipulate the iPhone's user interface to fake airplane mode while secretly maintaining Internet connectivity. Jamf Threat Labs detailed in a new report how the code controlling the different elements of iOS 16's…
-
"North Korean Cybercriminals Have Already Stolen $200 Million in Crypto Hacks in 2023"According to security researchers at TRM Labs, North Korea has stolen around $200 million in cryptocurrencies across 30 hacks so far in 2023, less than in 2022 but still a sum "10 times larger than attacks by other actors." The researchers noted that…
-
"Federally Insured Credit Unions Required to Report Cyber Incidents Within 3 Days"The National Credit Union Administration (NCUA) recently announced that it is updating its cyberattack reporting rules, requiring all federally insured credit unions to report incidents within 72 hours of discovery. The new policy, NCUA announced,…
-
"Down the Tubes: Common PVC Pipes Can Hack Voice Identification Systems"Researchers are trying to keep up with hackers and prevent data theft. Some standard tools include multi-factor authentication (MFA) systems, fingerprint technology, and retinal scans. Automatic speaker identification, which uses a person's voice as a…
-
"Alarming Lack of Cybersecurity Practices on World's Most Popular Websites"The Cybernews research team has explored an issue that developers often overlook: HTTP security headers. They analyzed the top 100 most-visited websites, such as PayPal, Wikipedia, and AliExpress. HTTP security headers provide instructions on how the…
-
"Play Ransomware Using MSPs and N-Days to Attack"Adlumin security researchers are warning of the Play ransomware group targeting security Managed Service Providers (MSPs) to gain initial access and exploit up to five-year-old security appliance vulnerabilities. According to Kevin O'Connor, director of…
-
"Federal Agency Investigating Dallas Ransomware Attack, Number Impacted up to 30,253"The U.S. Department of Health and Human Services recently announced that it is investigating Dallas’ ransomware attack from earlier this year. The city reported the data breach to the agency earlier this month, saying personal information from 30,…
-
"GridTrust Helps Protect the Nation's Electric Utilities from Cyber Threats"A new cybersecurity technology that relies on the unique digital fingerprint of a semiconductor chip could help defend the equipment of electrical utilities from malicious attacks in which software updates are exploited on devices controlling critical…
-
"Passwordless Is More Than a Buzzword Among Cybersecurity Pros"Even though cybersecurity strategies are moving toward a passwordless future, password security remains critical. Fifty-four percent of the 100 Black Hat USA 2023 attendees surveyed by Delinea deemed passwordless a viable concept, while 79 percent…