News
-
"Play Ransomware Using MSPs and N-Days to Attack"Adlumin security researchers are warning of the Play ransomware group targeting security Managed Service Providers (MSPs) to gain initial access and exploit up to five-year-old security appliance vulnerabilities. According to Kevin O'Connor, director of…
-
"Federal Agency Investigating Dallas Ransomware Attack, Number Impacted up to 30,253"The U.S. Department of Health and Human Services recently announced that it is investigating Dallas’ ransomware attack from earlier this year. The city reported the data breach to the agency earlier this month, saying personal information from 30,…
-
"GridTrust Helps Protect the Nation's Electric Utilities from Cyber Threats"A new cybersecurity technology that relies on the unique digital fingerprint of a semiconductor chip could help defend the equipment of electrical utilities from malicious attacks in which software updates are exploited on devices controlling critical…
-
"Passwordless Is More Than a Buzzword Among Cybersecurity Pros"Even though cybersecurity strategies are moving toward a passwordless future, password security remains critical. Fifty-four percent of the 100 Black Hat USA 2023 attendees surveyed by Delinea deemed passwordless a viable concept, while 79 percent…
-
"New LABRAT Campaign Exploits GitLab Flaw for Cryptojacking and Proxyjacking Activities"A new, financially motivated operation named LABRAT has been exploiting a now-patched critical vulnerability in GitLab to conduct cryptojacking and proxyjacking. According to Sysdig, the attacker used undetected signature-based tools, sophisticated cross…
-
"Massive 400,000 Proxy Botnet Built With Stealthy Malware Infections"Researchers have discovered an extensive campaign that distributed proxy server apps to at least 400,000 Windows systems. The devices function as residential exit nodes without the users' permission. A company is charging for the proxy traffic running…
-
"PowerShell Gallery Prone to Typosquatting, Other Supply Chain Attacks"According to Aqua Nautilus researchers, Microsoft's PowerShell Gallery poses a software supply chain risk due to its relatively weak protection against attackers uploading malicious packages to the online repository. Recent testing of the repository's…
-
"AnonFiles Shuts Down After Massive User Abuse"A popular anonymous file sharing service used by security researchers and threat actors has recently closed down, citing "extreme volumes" of users abusing it. AnonFiles was a going concern for two years, enabling anyone to share files without fear…
-
"'Distilling' Outdated Software Could Save Defense Dept. Millions in Time and Money"Many highly sophisticated systems, such as those that power drones, fighter jets, and even secure authentication programs, are custom software developed at great expense. It is not as simple as downloading the latest software patch and clicking "Install…
-
"Think Twice Before Accepting Notifications on Chrome: Threats on the Rise"Many websites request permission to display notifications upon arrival. Many users unknowingly expose themselves to risk because they are accustomed to agreeing to generic prompts. Oren Koren, co-founder of the cybersecurity company Veriti, warns that…
-
"Jefferson Cherry Hill Warns of Possible Data Breach. What Info May Have Been Exposed?"A missing piece of electronic equipment at Jefferson Health's hospital in Cherry Hill may have compromised the personal information of some of its patients, the health care provider recently revealed. Jefferson Health said it began mailing letters…
-
"CISA Publishes JCDC Remote Monitoring and Management Systems Cyber Defense Plan"As part of its 2023 Planning Agenda, the US Cybersecurity and Infrastructure Security Agency (CISA) has released the Cyber Defense Plan for Remote Monitoring and Management (RMM), the first proactive plan developed by industry and government partners…