"ASU Receives Three DEPSCoR Awards for Research Critical to National Security"

"ASU Receives Three DEPSCoR Awards for Research Critical to National Security"

The US Department of Defense (DOD) has awarded Defense Established Program to Stimulate Competitive Research (DEPSCoR) grants to three researchers in the Ira A. Fulton Schools of Engineering at Arizona State University (ASU). The three researchers will each receive up to $600,000 over three years to research cybersecurity, cyber deception, and more. Adil Ahmad and his team want to revolutionize computer logging infrastructure with the DEPSCoR grant. They will use logs to improve cybersecurity.

Submitted by grigby1 CPVI on

"51% of Enterprises Experienced a Breach Despite Large Security Stacks"

"51% of Enterprises Experienced a Breach Despite Large Security Stacks"

According to Pentera, 93 percent of enterprises that admitted to a breach experienced unplanned downtime, data exposure, or financial loss. Pentera surveyed 450 Chief Information Security Officers (CISOs), Chief Information Officers (CIOs), and Information Technology (IT) security leaders from companies with over 1,000 employees. On average, enterprises use 53 security solutions across their organization. However, despite large security stacks, 51 percent of enterprises reported a breach in the previous 24 months.

Submitted by grigby1 CPVI on

"BlackTech Targets Tech, Research, and Gov Sectors with New 'Deuterbear' Tool"

"BlackTech Targets Tech, Research, and Gov Sectors with New 'Deuterbear' Tool"

A threat actor called "BlackTech" has been targeting the Asia-Pacific region's technology, research, and government sectors. The attacks deliver an updated version of the modular backdoor named "Waterbear," and its enhanced successor, "Deuterbear." According to Trend Micro researchers, Waterbear is notoriously complex, using multiple evasion mechanisms to avoid detection and analysis. In 2022, "Earth Hundun" started using the new version of Waterbear, which includes several changes, such as anti-memory scanning and decryption routines.

Submitted by grigby1 CPVI on

"Hackers Are Threatening to Leak World-Check, a Huge Sanctions and Financial Crimes Watchlist"

"Hackers Are Threatening to Leak World-Check, a Huge Sanctions and Financial Crimes Watchlist"

A financially motivated criminal hacking group that calls itself "GhostR" claims to have stolen a confidential database containing millions of records companies use to screen potential customers for links to sanctions and financial crime. The hackers claimed they stole 5.3 million records from the World-Check screening database in March and are threatening to release the data online.

Submitted by grigby1 CPVI on

"Quishing Attacks Jump Tenfold, Attachment Payloads Halve"

"Quishing Attacks Jump Tenfold, Attachment Payloads Halve"

According to a new Egress report, quishing attacks, a type of phishing involving QR codes, have increased significantly, jumping from 0.8 percent in 2021 to 10.8 percent in 2024. The report also highlighted a decrease in attachment-based payloads, which fell from 72.7 percent to 35.7 percent during the same period. Impersonation attacks have persisted, with 77 percent posing as well-known brands, such as DocuSign and Microsoft.

Submitted by grigby1 CPVI on

"CISA Announces Winners of the 5th Annual President’s Cup Cybersecurity Competition"

"CISA Announces Winners of the 5th Annual President’s Cup Cybersecurity Competition"

The US Cybersecurity and Infrastructure Security Agency (CISA) held the final round of the fifth annual President's Cup Cybersecurity Competition and announced the winners. The President's Cup is a national competition that honors the top federal cybersecurity talent. This year's winning team, known as "Artificially Intelligent," consisted of members from the Department of Defense (DOD), the US Army, and the US Air Force.

Submitted by grigby1 CPVI on

"Fake Cheat Lures Gamers Into Spreading Infostealer Malware"

"Fake Cheat Lures Gamers Into Spreading Infostealer Malware"

A new infostealer malware linked to "Redline" masquerades as a game cheat called "Cheat Lab," promising downloaders a free copy if they persuade their friends to install it. Redline can steal sensitive data from infected computers, such as passwords, cookies, autofill information, and cryptocurrency wallet information. The malware is popular among cybercriminals and is widely distributed around the world via various channels.

Submitted by grigby1 CPVI on

"SAP Applications Increasingly in Attacker Crosshairs, Report Shows"

"SAP Applications Increasingly in Attacker Crosshairs, Report Shows"

According to a new report from Onapsis and Flashpoint, malicious hackers are increasingly interested in compromising organizations' SAP applications and data. This interest is suspected to be fueled by SAP application migrations to the cloud, as well as adversaries' increased ability to target misconfigurations and missing security patches in both cloud and on-premises deployments. Ransomware attacks against SAP systems have increased 400 percent over the past few years. On hacker forums, talks about SAP flaws and exploits increased by 490 percent, while discu

Submitted by grigby1 CPVI on

"'MadMxShell' Leverages Google Ads to Deploy Malware via Windows Backdoor"

"'MadMxShell' Leverages Google Ads to Deploy Malware via Windows Backdoor"

A threat actor has been using a cluster of domains posing as legitimate IP scanner software sites to distribute malware through a Windows backdoor dubbed "MadMxShell." According to Zscaler ThreatLabz, the threat actor registered multiple look-alike domains using a typosquatting technique. Then they used Google Ads to push the fraudulent domains to the top of search engine results for specific search keywords, luring potential victims to these IP scanner websites.

Submitted by grigby1 CPVI on

"Evil XDR: Researcher Turns Palo Alto Software Into Perfect Malware"

"Evil XDR: Researcher Turns Palo Alto Software Into Perfect Malware"

An exploit of Palo Alto Networks' Extended Detection and Response (XDR) software could have enabled attackers to manipulate it as a malicious multitool. Shmuel Cohen, a security researcher at SafeBreach, explained how he reverse-engineered and cracked the company's Cortex product. He used it to deploy a reverse shell and ransomware.

Submitted by grigby1 CPVI on
Subscribe to