"QR-Code Phishing Has Multiplied: How Detection Helps Security Teams Win"

"QR-Code Phishing Has Multiplied: How Detection Helps Security Teams Win"

A new wave of Microsoft-themed email messages emerged in June. The messages appeared legitimate, with the Microsoft logo prominently displayed and a familiar email template requiring the user to update their two-factor authentication (2FA) code. There were no attachments or links, just a QR code. When the user scans the QR code with their mobile device, they are taken to a Microsoft-themed web portal where they must enter their login credentials and subsequent MFA code. If they enter their credentials, the information is sent to an attacker, and the user's account is compromised.

Submitted by Gregory Rigby on

"Pretexting: A Growing Threat That Avoids Phishing's Obvious Tells"

"Pretexting: A Growing Threat That Avoids Phishing's Obvious Tells"

Phishing attacks on businesses pose a constant threat of data compromise, which is why many businesses invest in phishing awareness training. Training has resulted in more employees being aware of phishing strategies. As recipients become more aware of phishing tactics, attackers are resorting to another strategy called pretexting. Pretexting builds trust by using impersonation and false stories to persuade victims to share data or take other harmful actions.

Submitted by Gregory Rigby on

"Ransomware Surge is Driving UK Inflation, Says Veeam"

"Ransomware Surge is Driving UK Inflation, Says Veeam"

According to security researchers at Veeam, the ransomware epidemic hitting UK businesses is leading many to increase their prices, adding to already high inflation.  The researchers surveyed 100 directors of UK businesses with over 500 employees that had been successfully compromised at least once by ransomware in the past 18 months.  The researchers found that large companies had to increase costs to customers by an average of 17% following an attack.  Over a fifth (22%) of respondents said they increased prices by 21-30%, while 6% increased prices by 31-40%.

Submitted by Adam Ekwall on

"How Companies Should Think About Compensating Users for Private Data"

"How Companies Should Think About Compensating Users for Private Data"

As data-hungry Artificial Intelligence (AI) and Machine Learning (ML) technologies become more efficient, the key question, according to Ali Makhdoumi, an associate professor of decision sciences at Duke University's Fuqua School of Business, is how to incentivize data sharing while protecting users' privacy.

Submitted by Gregory Rigby on

"HCU Cyber Engineering Team Wins First Place in 'Capture the Flag' Cyber Competition"

"HCU Cyber Engineering Team Wins First Place in 'Capture the Flag' Cyber Competition"

A team of Houston Christian University (HCU) cyber engineering students took first place in the 2023 Capture the Flag (CTF) competition at the annual Alamo AFCEA chapter event (Alamo ACE). This is the second time an HCU team has won the top award at the annual conference. The CTF is a competition in which undergraduate and graduate college students compete to solve cybersecurity challenges in the realms of reverse engineering, cryptography, web vulnerabilities, memory forensics, network vulnerabilities, and data analytics.

Submitted by Gregory Rigby on

"US, UK Announce Charges and Sanctions Against Two Russian Hackers"

"US, UK Announce Charges and Sanctions Against Two Russian Hackers"

The United States and the United Kingdom recently announced charges and sanctions against two individuals allegedly involved in hacking and other cyber operations on behalf of Russia’s FSB security service.  The threat actor, linked to an FSB unit called Centre 18, has targeted academia, defense firms, governments, NGOs, and think tanks in the US, the UK, and other NATO countries.  The hackers conducted both cyberespionage operations and influence campaigns, including a campaign whose goal was to interfere in the 2019 elections in the United Kingdom.

Submitted by Adam Ekwall on

"New 5G Modems Flaws Affect iOS Devices and Android Models from Major Brands"

"New 5G Modems Flaws Affect iOS Devices and Android Models from Major Brands"

A set of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as MediaTek and Qualcomm affect USB and Internet of Things (IoT) modems, along with hundreds of Android and iOS smartphone models. Ten of the 14 flaws, collectively dubbed 5Ghoul, affect 5G modems from the two companies, out of which three have been identified as high-severity vulnerabilities. According to the researchers, 5Ghoul vulnerabilities could be used to continuously launch attacks.

Submitted by Gregory Rigby on

"Privilege Elevation Exploits Used in Over 50% Of Insider Attacks"

"Privilege Elevation Exploits Used in Over 50% Of Insider Attacks"

The elevation of privilege flaws is the most common vulnerability corporate insiders exploit when conducting unauthorized activities on networks, according to a Crowdstrike report. The report, based on data collected between January 2021 and April 2023, reveals that insider threats are rising, and the use of privilege escalation flaws is a major component of unauthorized activity.

Submitted by Gregory Rigby on

"Proxy Trojan Targets macOS Users for Traffic Redirection"

"Proxy Trojan Targets macOS Users for Traffic Redirection"

A sophisticated proxy Trojan targeting macOS is being distributed via pirated versions of legitimate business software such as editing tools, data recovery software, and network scanning applications. The Trojan works by posing as a legitimate program during installation and then creating a hidden proxy server on the user's system. This covert server allows threat actors to keep a backdoor open on the system while also redirecting network traffic through the compromised device. Such a proxy Trojan can have varying degrees of severity for victims.

Submitted by Gregory Rigby on

"Alert Fatigue Puts Pressure on Security and Development Teams"

"Alert Fatigue Puts Pressure on Security and Development Teams"

According to Cycode, security practitioners are under significant pressure to secure today's applications. Seventy-eight percent of CISOs stated that today's AppSec attack surfaces are unmanageable, and 90 percent revealed that relationships between their security and development teams need improvement. Seventy-seven percent of CISOs believe software supply chain security is a more significant gap in AppSec than generative Artificial Intelligence (AI) or open source.

Submitted by Gregory Rigby on
Subscribe to