-
"Final Version of TIC Use Cases Covering Cloud Services"Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and Email-as-a-Service (EaaS) have unique security considerations. The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (…
-
"Pen Testers Need to Hack AI, but Also Question Its Existence"Samsung has prohibited some uses of ChatGPT, while Ford and Volkswagen have shut down their self-driving car company, and a letter calling for a halt to the training of more powerful Artificial Intelligence (AI) systems has received over 25,000…
-
"Iranian Hackers Using SimpleHelp Remote Support Software for Persistent Access"MuddyWater, an Iranian threat actor, continues its time-tested practice of using legitimate remote administration tools to seize control of targeted systems. While the nation-state group previously used ScreenConnect, RemoteUtilities, and Syncro, a new…
-
"The Attacks That Can Target Your Windows Active Directory"Active Directory (AD) remains the predominant source of Identity and Access Management (IAM) in the enterprise, making it the target of numerous attacks. There are multiple attack techniques and attack vectors that hackers use to target AD. Different…
-
"Pre-Pandemic Techniques Are Fueling Record Fraud Rates"According to Pindrop, the rise and adoption of Artificial Intelligence (AI), an impending recession, and the return of pre-pandemic fraud techniques are driving record rates of fraud attacks against consumers and businesses. States with restrictions on…
-
"Cyber Intrusion Detection Time at an All-Time Low"Security researchers at Google's Mandiant have found that organizations and their cyber defenders are getting better at detecting cyberattacks, but detection time still stands at 16 days. During the study, the researchers found that 2022 saw a…
-
"Creative Software Maker Affinity Informs Customers of Forum Breach"UK-based photo editing, graphic design, and publishing software developer Affinity recently informed its forum members of a data breach that occurred on April 6. The company said a hacker gained access to forum user data after compromising an…
-
"Student Privacy Is at More Risk Than Ever Before. Can K-12 Schools Keep It Safe?"Education technology is now an integral part of the education system. However, there are concerns regarding the readiness of K-12 districts to address the complex privacy and security issues raised by such technology. According to "Uncovering Privacy and…
-
"New Domino Backdoor Malware Linked to Ex-Conti, FIN7 Criminals"Domino Backdoor is a new malware linked by security researchers to former members of the prolific Conti and FIN7 groups. It has been used to launch information-stealing malware, which involves the same techniques and source code as the infamous groups,…
-
"HHS Launches New Cybersecurity Awareness Resources"The Department of Health and Human Services (HHS) has released three new cybersecurity resources, each of which focuses on educating medical institutions on how to better protect their digital infrastructures. Two websites and an online report provide…
-
"Vice Society Gang Is Using a Custom PowerShell Tool for Data Exfiltration"Palo Alto Networks Unit 42 found the Vice Society ransomware group exfiltrating data from a victim network using a custom-built Microsoft PowerShell script. Using this PowerShell tool, the threat actors are circumventing software and/or human-based…
-
"UK Education Sector Suffered Most from Ransomware in 2022"Security researchers at Malwarebytes have discovered that the education sector in the UK was hit far more by ransomware than in other countries last year, thanks to targeting by the Vice Society group. The security vendor’s latest findings from…
News