"Skills Shortages Now a Top-Two Security Risk for SMBs"

"Skills Shortages Now a Top-Two Security Risk for SMBs"

According to a new study by Sophos, a shortage of cybersecurity expertise and capacity in global SMBs is fueling talent burnout and creating new opportunities for threat actors.

Submitted by Adam Ekwall on

"Eight Million Users Install 200+ Malicious Apps from Google Play"

"Eight Million Users Install 200+ Malicious Apps from Google Play"

Between June 2023 and April 2024, security researchers at Zscaler discovered over 200 malicious apps on Google Play, which is nominally a safer platform for Android downloads than third-party app stores.  These apps collectively garnered more than eight million installs.  The researchers noted that Joker was the most prolific malware, accounting for nearly two-fifths (38%) of malicious apps identified by Zscaler. Joker enables Wireless Application Protocol (WAP) fraud, by covertly subscribing victims to premium-rate services without their consent.

Submitted by Adam Ekwall on

"Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open Source Ecosystems"

"Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open Source Ecosystems"

Researchers at Checkmarx have discovered that threat actors could abuse entry points across PyPI, npm, Ruby Gems, and other programming ecosystems to stage software supply chain attacks. The researchers warned that attackers could use these entry points to execute malicious code when specific commands are run, putting the open source landscape at significant risk. Entry point attacks enable threat actors to sneakily and persistently compromise systems without triggering traditional security defenses.

Submitted by Gregory Rigby on

"Georgia Tech's New Tool Can Detect Malware on Android Phones"

"Georgia Tech's New Tool Can Detect Malware on Android Phones"

Researchers at the Georgia Institute of Technology (Georgia Tech) have developed a new tool named "Detector of Victim-specific Accessibility" (DVa) to check for malware on Android phones. DVa runs on the cloud, checking the phone for malware, then producing a report for the user that outlines which apps are malware and how to remove them. Smartphones are accessible to people with disabilities because of the implementation of screen readers, voice-to-text, and other features. However, these features also make phones more hackable.

Submitted by Gregory Rigby on

"Juniper Networks Patches Dozens of Vulnerabilities"

"Juniper Networks Patches Dozens of Vulnerabilities"

Juniper Networks has recently released patches for dozens of vulnerabilities in its Junos OS and Junos OS Evolved network operating systems, including multiple flaws in several third-party software components. Fixes were announced for around a dozen high-severity security defects impacting components such as the packet forwarding engine (PFE), routing protocol daemon (RPD), routing engine (RE), kernel, and HTTP daemon.

Submitted by Adam Ekwall on

"OpenAI Confirms Threat Actors Use ChatGPT to Write Malware"

"OpenAI Confirms Threat Actors Use ChatGPT to Write Malware"

OpenAI disrupted over 20 malicious cyber operations involving ChatGPT, its Artificial Intelligence (AI)-driven chatbot. Threat actors have used ChatGPT to develop malware, evade detection, and more. OpenAI's report is the first to officially confirm that generative mainstream AI tools are being used for offensive cyber operations. In April, Proofpoint reported that "TA547," also known as "Scully Spider," launched an AI-written PowerShell loader for the "Rhadamanthys" infostealer.

Submitted by Gregory Rigby on

"US DOD Tightens Cybersecurity Standards for Defense Contractors"

"US DOD Tightens Cybersecurity Standards for Defense Contractors"

The finalization of the latest version of the Cybersecurity Maturity Model Certification (CMMC) program empowers US Department of Defense (DOD) officials to better assess cybersecurity measures implemented by defense contractors. Defense contractors must pass the program to bid on DOD contracts. The CMMC will verify that DOD's thousands of contractors comply with Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) protections. This article continues to discuss the evolution of the CMMC program.

Submitted by Gregory Rigby on

"Cyber Insurer Says Ransomware Attacks Drove a Spike in Claim Sizes"

"Cyber Insurer Says Ransomware Attacks Drove a Spike in Claim Sizes"

The cyber insurance provider Coalition reported that its customers made fewer claims in the first half of 2024 than in the same period in 2023, but their average loss increased by 14 percent to $122,000. According to the company, the rise in ransomware severity increased losses, and threat actors targeted larger businesses. This article continues to discuss findings regarding the rise in ransomware demands and claim sizes.

Submitted by Gregory Rigby on

"Pokémon Developer Game Freak Suffers Data Breach"

"Pokémon Developer Game Freak Suffers Data Breach"

Japanese game developer Game Freak, the firm behind the Pokémon franchise, has recently suffered a security breach exposing the data of 2606 employees and partners.  The leak first appeared on forum 4chan in early October and is now circulating on social media and online forums under the name "TeraLeak."  TeraLeak contains multiple gigabytes of information.

Submitted by Adam Ekwall on
Subscribe to