Microsoft Updates Windows 11 Subsystem for Android to Introduce Support For VPN-Assigned IPs
Users can now connect to a VPN on their desktops and enjoy benefits of VPNs on their mobiles Read More: https://www.infosecurity-magazine.com/news/microsoft-updates-windows/
SHI International Corp. Confirms Cyberattack
SHI International, formerly known as Software House International, is a privately-owned provider of technology products and services headquartered in Somerset, New Jersey. The IT services company has recently disclosed that
People Power: How to Hire and Keep the Right MSP Talent
Hiring and keeping talent, whether it’s technical, sales, marketing, or administrative, can be critically important to an MSP’s success. During the last couple of years, the amount of churn and
Cisco Releases 10 Security Patches For Expressway Series and TelePresence VCS Products
There are no workarounds that can be used to address the flaws, so updating systems is paramount Read More: https://www.infosecurity-magazine.com/news/cisco-releases-ten-security-patches/
FBI: These hackers are targeting healthcare records and IT systems with 'Maui' ransomware
Image: Dzelat/Shutterstock Three US agencies have warned over a lesser unknown ransomware called Maui that has targeted IT services at healthcare and public health organizations since May 2021. The Federal
Hack Allows Drone Takeover Via ‘ExpressLRS’ Protocol
A radio control system for drones is vulnerable to remote takeover, thanks to a weakness in the mechanism that binds transmitter and receiver. The popular protocol for radio controlled (RC)
Hackers linked to the Chinese government increasingly target Russia, analysis suggests
Written by AJ Vicens Jul 7, 2022 | CYBERSCOOP Nation-state hackers with links to the Chinese government seem to be targeting Russian entities at an increasing rate, an analysis published
Marriott Confirms Data Breach
The recent incident at Marriott is not the first time the company has been the victim of a massive data breach. An incident that occurred in 2014 but was not
Russian Info Ops Ramp Up Effort to Divide West on Ukraine
Recorded Future claims Kremlin is using multiple outlets to amplify disinfoRead More: https://www.infosecurity-magazine.com/news/russian-info-ops-divide-west/
Why MSPs (and their customers) need MDR services
Managed Service Providers hold the keys to the kingdom, since they manage networks and IT infrastructures for hundreds of small businesses. These providers are fast becoming a primary target for
FBI and MI5 Bosses Warn of “Massive” China Threat
Unprecedented joint press conference signals urgent need to actRead More: https://www.infosecurity-magazine.com/news/fbi-mi5-bosses-warn-massive-china/
Marriott Plays Down 20GB Data Breach
Global hotel chain compromised yet againRead More: https://www.infosecurity-magazine.com/news/marriott-plays-down-20gb-data/
Russian information operations focus on dividing Western coalition supporting Ukraine
Written by Suzanne Smalley Jul 7, 2022 | CYBERSCOOP Russian intelligence has been using state-controlled media and other disinformation channels to disseminate propaganda designed to divide the Western coalition supporting
Unpacking Cloud-Based Cryptocurrency Miners That Abuse GitHub Actions and Azure Virtual Machines
Trend Micro – In this section, we cover how malicious actors are leveraging Windows runners in their attempts to mine cryptocurrency, as well as the persistence techniques they use to
What Makes External Attack Surface Management Essential?
Digital or external attack surface has become a growing concern for cybersecurity teams. In addition to patching up vulnerabilities within internal infrastructures, a major gap in security could lurk behind
What Are the Security Benefits of Using a Digital Signature?
In our digital age, it’s now become commonplace to sign documents online using what is known as a digital signature. This is an electronic replica of someone’s signature, which they
Apple previews “Lockdown Mode,” a new extreme security feature
Apple Apple on Wednesday shared details of a new, extreme security option called “Lockdown Mode” for Apple device users who face serious, sophisticated digital threats. Lockdown Mode will be available
Mobile Cybersecurity Firm Cirotta Launches Anti-Hacking Phone Cases
Israeli Mobile Cybersecurity Startup Cirotta has launched smartphone cases that the company claims to provide complete protection while allowing full operation of devices. Tel Aviv, Israel-based startup Cirotta has introduced
FBI, CISA, Treasury: North Korean hackers taking aim at health care with Maui ransomware
Written by Tim Starks Jul 6, 2022 | CYBERSCOOP Three federal agencies said Wednesday that North Korean hackers have been attacking the health care sector with ransomware, and cautioned victims
North Korean Hackers Target US Health Providers With 'Maui' Ransomware
According to CISA, the threat actors have been engaging in these campaigns since May 2021Read More: https://www.infosecurity-magazine.com/news/north-korea-us-maui-ransomware/
Apple ramps up war on spyware, a growing digital scourge
Written by Tonya Riley Jul 6, 2022 | CYBERSCOOP Apple will introduce a feature this fall allowing users to lock services that could otherwise be exploited by malicious hackers looking
APT Hacker Group Bitter Continues to Attack Military Targets in Bangladesh
The weaponized Excel document would likely be distributed by means of a spear-phishing emailRead More: https://www.infosecurity-magazine.com/news/apt-bitter-attack-military/
Hive Ransomware Upgraded to Rust to Deliver More Sophisticated Encryption
Hive is not the first ransomware written in Rust, and follows in the footsteps of BlackCatRead More: https://www.infosecurity-magazine.com/news/hive-ransomware-upgraded-rust/
This ransomware just switched programming languages from Go to Rust. Here's why
Image: perinjo/GETTY Microsoft security researchers have discovered new variants of the one-year-old Hive ransomware that was written in the Go programming language but has been re-written in Rust. Hive emerged
Bulk Email Theft May Point to Russian Espionage
Security Intelligence – Bulk Email Theft May Point to Russian Espionage Home / News Bulk Email Theft May Point to Russian Espionage Share Cybersecurity researchers recently identified a threat group with
How Cyber Resilience Enables Business Growth
We live in a time of unprecedented technological innovation. We are more digitally connected in our work and personal lives than ever before. If you can dream it, you can
Heimdal™ Successfully Completes SOC 2 Type II and ISAE 3000 Examination, Indicating Strict Security Standards Compliance
COPENHAGEN, July 6th, 2022 – Heimdal™ is pleased to announce it has attained certification for ISAE 3000 SOC 2 Type II, demonstrating a commitment to providing customers with the highest
No backup: Why cyberattacks are a big risk for the government in Brazil
iStock The vast majority of federal government organizations in Brazil are at a high risk of cyberattacks, a new report produced by the Federal Audit Court (TCU) has found. A group
New Strain of Ransomware Discovered
RedAlert is a new ransomware operation also known as (N13V) that encrypts VMWare ESXi servers running either Windows or Linux. What Happened? As explained by BleepingComputer the threat actors refer
Endless cyber-threat pressure could leave security staff burnt out. Here's what you need to change
Image: Getty/Jay Yuno Businesses should be prepared for an extended period of heightened cyber threats and they need to take action to prevent their cybersecurity staff from being overworked, the
Human Error Blamed for Leak of 1 Billion Records of Chinese Citizens
A developer appears to have divulged credentials to a police database on a popular developer forum, leading to a breach and subsequent bid to sell 23 terabytes of personal data
Google Patches Chrome Zero Day Under Attack
Rapid fix for vulnerability being exploited in the wildRead More: https://www.infosecurity-magazine.com/news/google-patches-chrome-zero-day/
To stop quantum hackers, the US just chose these four quantum-resistant encryption algorithms
Image: wacomka/Shutterstock The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has selected four quantum-resistant cryptographic algorithms for general encryption and digital signatures. NIST, a US standards
Malicious NPM Packages Snatch Data from Apps and Website Forms, Researchers Say
Since at least December 2021, the NPM package manager has been the target of a pervasive software supply chain attack that used rogue modules to obtain information from forms that
NCSC: Prepare for Protected Period of Heightened Cyber Risk
Agency warns Russian threat will remain elevated for a long timeRead More: https://www.infosecurity-magazine.com/news/ncsc-prepare-cyber-risk/
Software Supply Chain Attack Hits Thousands of Apps
Researchers discover malicious npm packagesRead More: https://www.infosecurity-magazine.com/news/software-supply-chain-attack/
Russia has been at war with Ukraine for years – in cyberspace
Padlokr – Russian President Vladimir Putin walks through a hall in the building housing Russia’s GRU military intelligence service. Dmitry Astakhov, Sputnik, Government Pool Photo via AP Maggie Smith, United
Cyberattacks have yet to play a significant role in Russia’s battlefield operations in Ukraine – cyberwarfare experts explain the likely reasons
Padlokr – There is little evidence that Russia has coordinated cyber operations with conventional military operations in Ukraine. Russian Defense Ministry Press Service via AP Nadiya Kostyuk, Georgia Institute of
Cyber Cold War? The US and Russia talk tough, but only diplomacy will ease the threat
Padlokr – Ahmed Ibrahim, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University Over the past few years, tensions have been rising between Russia and the United States — not
Espionage attempts like the SolarWinds hack are inevitable, so it’s safer to focus on defense – not retaliation
Padlokr – The U.S. Justice Department was among many federal agencies and private companies whose networks suffered intrusions from Russian hackers. AP Photo/Jacquelyn Martin William Akoto, Fordham University In the
The Sunburst hack was massive and devastating – 5 observations from a cybersecurity expert
Padlokr – Federal government agencies, from the Treasury Department to the National Nuclear Security Administration, have been compromised by the attack. Tasos Katopodis/Getty Images Paulo Shakarian, Arizona State University So
Cyberspace is the next front in Iran-US conflict – and private companies may bear the brunt
Padlokr – In the wake of U.S. killings, Iran’s supreme leader vowed ‘harsh revenge’ – which could come in the form of cyber attacks. Office of the Iranian Supreme Leader
US military steps up cyberwarfare effort
Padlokr – The U.S. military is shifting the focus of its cyberwarfare forces. U.S. Air Force Benjamin Jensen, American University School of International Service and Brandon Valeriano, Marine Corps University
Why Huawei security concerns cannot be removed from US-China relations
Padlokr – Sascha-Dominik (Dov) Bachmann, Bournemouth University and Anthony Paphiti, Bournemouth University Huawei’s role in building new 5G networks has become one of the most controversial topics in current international
Artificial intelligence cyber attacks are coming – but what does that mean?
Padlokr – Jeremy Straub, North Dakota State University Hackers will start to get help from robots and artificial intelligence soon. Jinning Li/Shutterstock.com The next major cyberattack could involve artificial intelligence
Brand-New HavanaCrypt Ransomware Poses as Google Software Update App, Uses Microsoft Hosting Service IP Address as C&C Server
Trend Micro – Brand-New HavanaCrypt Ransomware Poses as Google Software Update App Uses Microsoft Hosting Service IP Address as C&C Server We recently found a new ransomware family, which we
ICS & OT Cybersecurity Attack Trends
Trend Micro – Trend Micro also found that enterprises suffered multiple attacks and disruptions over a 12-month period. 72% of respondents reported experiences at least six ICS/OT disruptions due to
Protection Against Online Scams: How to Keep Your Credit Safe
Credit card fraud happens when someone steals your credit information and uses it to make purchases or borrow money. While victims of fraud don’t typically have to pay anything, the