"NSA Releases Guidance on the Visibility and Analytics Pillar of Zero Trust"

"NSA Releases Guidance on the Visibility and Analytics Pillar of Zero Trust"

The National Security Agency (NSA) has released a Cybersecurity Information Sheet (CSI) titled "Advancing Zero Trust Maturity Throughout the Visibility and Analytics Pillar," which describes the infrastructure, tools, data, and methods of this Zero Trust (ZT) framework pillar. Organizations are encouraged to follow the report's advice to mitigate risks and quickly identify, detect, and respond to cyber threats. Recommended actions include logging all relevant activity, centralizing security information and event management, regularly using security and risk analytics, and more.

Submitted by Gregory Rigby on

"Advance Fee Fraud Targets Colleges With Free Piano Offers"

"Advance Fee Fraud Targets Colleges With Free Piano Offers"

A piano-themed email campaign targeting students and faculty at North American colleges and universities commits Advance Fee Fraud (AFF). According to Proofpoint, over 125,000 emails have been observed in this scam cluster this year. Fraudsters offer free pianos in deceptive emails and then direct respondents to a fake shipping company that demands payment before delivering the piano. The scammers accept Zelle, Cash App, PayPal, Apple Pay, and cryptocurrency. They also try to get victims' names, addresses, and phone numbers. This article continues to discuss the AFF email campaign.

Submitted by Gregory Rigby on

"Cooler Master Hit by Data Breach Exposing Customer Information"

"Cooler Master Hit by Data Breach Exposing Customer Information"

Computer hardware manufacturer Cooler Master has recently suffered a data breach after a threat actor breached the company's website and claimed to steal the Fanzone member information of 500,000 customers.  Yesterday, a threat actor by the alias "Ghostr" contacted BleepingComputer and claimed to have stolen 103 GB of data from Cooler Master on May 18th, 2024.

Submitted by Adam Ekwall on

"Cybersecurity With Human-AI Collaboration"

"Cybersecurity With Human-AI Collaboration"

Stephen Schwab, director of strategy for the University of Southern California (USC) Information Sciences Institute's (ISI) Networking and Cybersecurity division, envisions symbiotic teams of humans and Artificial Intelligence (AI) models working together to strengthen security. AI can help analysts thrive in high-stakes environments. Schwab and his team use testbeds and models to study AI-assisted cybersecurity in smaller systems.

Submitted by Gregory Rigby on

"macOS Version of Elusive 'LightSpy' Spyware Tool Discovered"

"macOS Version of Elusive 'LightSpy' Spyware Tool Discovered"

A macOS version of the "LightSpy" surveillance framework extends the tool's targeting beyond Android and iOS devices. LightSpy is a modular iOS and Android surveillance framework used to steal files, screenshots, location data and more from victims' mobile devices. Attackers have used the framework against targets in the Asia–Pacific region. ThreatFabric reports that a macOS implant has been active in the wild since January 2024. This article continues to discuss findings regarding the macOS version of the LightSpy spyware tool.

Submitted by Gregory Rigby on

"BBC Suffers Data Breach Impacting Current, Former Employees"

"BBC Suffers Data Breach Impacting Current, Former Employees"

The BBC has recently disclosed a cyberattack that occurred on May 21, involving unauthorized access to files hosted on a cloud-based service, compromising the personal information of BBC Pension Scheme members.  The company noted that the incident impacted roughly 25,000 people, including current and former employees of Britain's national public service broadcaster.  The compromised data includes full names, national insurance numbers, dates of birth, sex, and home addresses.

Submitted by Adam Ekwall on

"TrickBot and Other Malware Droppers Disrupted by Law Enforcement"

"TrickBot and Other Malware Droppers Disrupted by Law Enforcement"

Europol has reported that authorities in over a dozen countries have disrupted the TrickBot botnet and several other malware droppers. The law enforcement operation called "Operation Endgame" targeted "Bumblebee," "IcedID," "Pikabot," "Smokeloader," "SystemBC," and "TrickBot" from May 27 to 29 to disrupt criminal operations and arrest the cybercriminals behind them. These droppers have been used in the first stage of malicious attacks to steal data, control compromised machines, and install other malware, including ransomware.

Submitted by Gregory Rigby on

"Ransomware Attack Disrupts Seattle Public Library Services"

"Ransomware Attack Disrupts Seattle Public Library Services"

The Seattle Public Library is trying to restore its online services after falling victim to a ransomware attack over the Memorial Day weekend.  The library says it identified the attack on May 25, which impacted all its online services.  The Library noted that the disruption began impacting access to staff and public computers, its online catalog and loaning system, e-books and e-audiobooks, in-building Wi-Fi, and its website at www.spl.org.

Submitted by Adam Ekwall on

"FBCS Data Breach Impact Grows to 3.2 Million Individuals"

"FBCS Data Breach Impact Grows to 3.2 Million Individuals"

In late April, Financial Business and Consumer Solutions (FBCS) announced that it was affected by a cyberattack.  The company noted that a breach occurred on February 26, and in the two weeks before the discovery of the intrusion, hackers accessed some systems and may have stolen information. Names, dates of birth, Social Security numbers, driver’s licenses, other identification numbers, and account information may have been compromised.  The company initially reported that 1.9 million people were impacted.

Submitted by Adam Ekwall on

"Study Sheds Light on Shady World of Text Message Phishing Scams"

"Study Sheds Light on Shady World of Text Message Phishing Scams"

Researchers have collected and analyzed data on SMS phishing attacks, delving into the scope and nature of the operations behind such attacks. The work also explores how additional data on phishing activities can be collected and identifies ways in which law enforcement officials can address phishing operations. SMS phishing involves scammers impersonating a bank, government agency, or other trusted party to trick victims into sharing personal information such as credit card numbers and passwords. This article continues to discuss the study of SMS phishing tactics and infrastructure.

Submitted by Gregory Rigby on
Subscribe to