"Turla Group Deploys LunarWeb and LunarMail Backdoors in Diplomatic Missions"

"Turla Group Deploys LunarWeb and LunarMail Backdoors in Diplomatic Missions"

Two previously undocumented backdoors, "LunarWeb" and "LunarMail," targeted an unnamed European Ministry of Foreign Affairs (MFA) and its three diplomatic missions in the Middle East. ESET attributed the activity to the Russia-aligned cyber espionage group "Turla" with medium confidence, citing tactical overlaps with previous campaigns. Turla, an Advanced Persistent Threat (APT) found to be affiliated with Russia's Federal Security Service (FSB), has been active since at least 1996. It has targeted government, embassies, military, education, research, and pharmaceutical industries.

Submitted by grigby1 CPVI on

"900k Impacted by Data Breach at Mississippi Healthcare Provider"

"900k Impacted by Data Breach at Mississippi Healthcare Provider"

Mississippi healthcare provider Singing River Health System (SRHS) recently notified roughly 900,000 individuals that their personal information was compromised in an August 2023 ransomware attack. SRHS revealed that its systems were compromised on August 16, 2023, while ransomware was deployed three days later, on August 19. SRHS noted that during this timeframe, the attackers accessed personal information such as names, addresses, dates of birth, Social Security numbers, and health and medical information.

Submitted by Adam Ekwall on

"How Attackers Deliver Malware to Foxit PDF Reader Users"

"How Attackers Deliver Malware to Foxit PDF Reader Users"

According to Check Point researchers, threat actors are exploiting Foxit PDF Reader's flawed alerts to deliver malware via booby-trapped PDFs. The researchers analyzed several campaigns involving malicious PDF files targeting Foxit Reader users. The attackers use various .NET and Python exploit builders, with the "PDF Exploit Builder" being the most popular. They create PDF documents with macros that execute commands/scripts. These download and execute "Agent Tesla," "Remcon RAT," "Xworm," "NanoCore RAT," and other malware.

Submitted by grigby1 CPVI on

"NIST Finalizes Updated Guidelines for Protecting Sensitive Information"

"NIST Finalizes Updated Guidelines for Protecting Sensitive Information"

The National Institute of Standards and Technology (NIST) has finalized its updated guidelines for protecting Controlled Unclassified Information (CUI) in two publications titled "Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations" and "Assessing Security Requirements for Controlled Unclassified Information." Contractors and other organizations doing business with the federal government now have clearer guidance for protecting the sensitive data they handle.

Submitted by grigby1 CPVI on

"Female Health Apps Misuse Highly Sensitive Data, Study Finds"

"Female Health Apps Misuse Highly Sensitive Data, Study Finds"

New research from King's College London and University College London (UCL) delved into the poor data handling practices followed by apps designed for female health monitoring, which put users at risk of privacy and safety issues.

Submitted by grigby1 CPVI on
Subscribe to