Apple previews “Lockdown Mode,” a new extreme security feature
Apple Apple on Wednesday shared details of a new, extreme security option called “Lockdown Mode” for Apple device users who face serious, sophisticated digital threats. Lockdown Mode will be available
Mobile Cybersecurity Firm Cirotta Launches Anti-Hacking Phone Cases
Israeli Mobile Cybersecurity Startup Cirotta has launched smartphone cases that the company claims to provide complete protection while allowing full operation of devices. Tel Aviv, Israel-based startup Cirotta has introduced
FBI, CISA, Treasury: North Korean hackers taking aim at health care with Maui ransomware
Written by Tim Starks Jul 6, 2022 | CYBERSCOOP Three federal agencies said Wednesday that North Korean hackers have been attacking the health care sector with ransomware, and cautioned victims
North Korean Hackers Target US Health Providers With 'Maui' Ransomware
According to CISA, the threat actors have been engaging in these campaigns since May 2021Read More: https://www.infosecurity-magazine.com/news/north-korea-us-maui-ransomware/
Apple ramps up war on spyware, a growing digital scourge
Written by Tonya Riley Jul 6, 2022 | CYBERSCOOP Apple will introduce a feature this fall allowing users to lock services that could otherwise be exploited by malicious hackers looking
APT Hacker Group Bitter Continues to Attack Military Targets in Bangladesh
The weaponized Excel document would likely be distributed by means of a spear-phishing emailRead More: https://www.infosecurity-magazine.com/news/apt-bitter-attack-military/
Hive Ransomware Upgraded to Rust to Deliver More Sophisticated Encryption
Hive is not the first ransomware written in Rust, and follows in the footsteps of BlackCatRead More: https://www.infosecurity-magazine.com/news/hive-ransomware-upgraded-rust/
This ransomware just switched programming languages from Go to Rust. Here's why
Image: perinjo/GETTY Microsoft security researchers have discovered new variants of the one-year-old Hive ransomware that was written in the Go programming language but has been re-written in Rust. Hive emerged
Bulk Email Theft May Point to Russian Espionage
Security Intelligence – Bulk Email Theft May Point to Russian Espionage Home / News Bulk Email Theft May Point to Russian Espionage Share Cybersecurity researchers recently identified a threat group with
How Cyber Resilience Enables Business Growth
We live in a time of unprecedented technological innovation. We are more digitally connected in our work and personal lives than ever before. If you can dream it, you can
Heimdal™ Successfully Completes SOC 2 Type II and ISAE 3000 Examination, Indicating Strict Security Standards Compliance
COPENHAGEN, July 6th, 2022 – Heimdal™ is pleased to announce it has attained certification for ISAE 3000 SOC 2 Type II, demonstrating a commitment to providing customers with the highest
No backup: Why cyberattacks are a big risk for the government in Brazil
iStock The vast majority of federal government organizations in Brazil are at a high risk of cyberattacks, a new report produced by the Federal Audit Court (TCU) has found. A group
New Strain of Ransomware Discovered
RedAlert is a new ransomware operation also known as (N13V) that encrypts VMWare ESXi servers running either Windows or Linux. What Happened? As explained by BleepingComputer the threat actors refer
Endless cyber-threat pressure could leave security staff burnt out. Here's what you need to change
Image: Getty/Jay Yuno Businesses should be prepared for an extended period of heightened cyber threats and they need to take action to prevent their cybersecurity staff from being overworked, the
Human Error Blamed for Leak of 1 Billion Records of Chinese Citizens
A developer appears to have divulged credentials to a police database on a popular developer forum, leading to a breach and subsequent bid to sell 23 terabytes of personal data
Google Patches Chrome Zero Day Under Attack
Rapid fix for vulnerability being exploited in the wildRead More: https://www.infosecurity-magazine.com/news/google-patches-chrome-zero-day/
To stop quantum hackers, the US just chose these four quantum-resistant encryption algorithms
Image: wacomka/Shutterstock The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has selected four quantum-resistant cryptographic algorithms for general encryption and digital signatures. NIST, a US standards
Malicious NPM Packages Snatch Data from Apps and Website Forms, Researchers Say
Since at least December 2021, the NPM package manager has been the target of a pervasive software supply chain attack that used rogue modules to obtain information from forms that
NCSC: Prepare for Protected Period of Heightened Cyber Risk
Agency warns Russian threat will remain elevated for a long timeRead More: https://www.infosecurity-magazine.com/news/ncsc-prepare-cyber-risk/
Software Supply Chain Attack Hits Thousands of Apps
Researchers discover malicious npm packagesRead More: https://www.infosecurity-magazine.com/news/software-supply-chain-attack/
Russia has been at war with Ukraine for years – in cyberspace
Padlokr – Russian President Vladimir Putin walks through a hall in the building housing Russia’s GRU military intelligence service. Dmitry Astakhov, Sputnik, Government Pool Photo via AP Maggie Smith, United
Cyberattacks have yet to play a significant role in Russia’s battlefield operations in Ukraine – cyberwarfare experts explain the likely reasons
Padlokr – There is little evidence that Russia has coordinated cyber operations with conventional military operations in Ukraine. Russian Defense Ministry Press Service via AP Nadiya Kostyuk, Georgia Institute of
Cyber Cold War? The US and Russia talk tough, but only diplomacy will ease the threat
Padlokr – Ahmed Ibrahim, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University Over the past few years, tensions have been rising between Russia and the United States — not
Espionage attempts like the SolarWinds hack are inevitable, so it’s safer to focus on defense – not retaliation
Padlokr – The U.S. Justice Department was among many federal agencies and private companies whose networks suffered intrusions from Russian hackers. AP Photo/Jacquelyn Martin William Akoto, Fordham University In the
The Sunburst hack was massive and devastating – 5 observations from a cybersecurity expert
Padlokr – Federal government agencies, from the Treasury Department to the National Nuclear Security Administration, have been compromised by the attack. Tasos Katopodis/Getty Images Paulo Shakarian, Arizona State University So
Cyberspace is the next front in Iran-US conflict – and private companies may bear the brunt
Padlokr – In the wake of U.S. killings, Iran’s supreme leader vowed ‘harsh revenge’ – which could come in the form of cyber attacks. Office of the Iranian Supreme Leader
US military steps up cyberwarfare effort
Padlokr – The U.S. military is shifting the focus of its cyberwarfare forces. U.S. Air Force Benjamin Jensen, American University School of International Service and Brandon Valeriano, Marine Corps University
Why Huawei security concerns cannot be removed from US-China relations
Padlokr – Sascha-Dominik (Dov) Bachmann, Bournemouth University and Anthony Paphiti, Bournemouth University Huawei’s role in building new 5G networks has become one of the most controversial topics in current international
Artificial intelligence cyber attacks are coming – but what does that mean?
Padlokr – Jeremy Straub, North Dakota State University Hackers will start to get help from robots and artificial intelligence soon. Jinning Li/Shutterstock.com The next major cyberattack could involve artificial intelligence
Brand-New HavanaCrypt Ransomware Poses as Google Software Update App, Uses Microsoft Hosting Service IP Address as C&C Server
Trend Micro – Brand-New HavanaCrypt Ransomware Poses as Google Software Update App Uses Microsoft Hosting Service IP Address as C&C Server We recently found a new ransomware family, which we
ICS & OT Cybersecurity Attack Trends
Trend Micro – Trend Micro also found that enterprises suffered multiple attacks and disruptions over a 12-month period. 72% of respondents reported experiences at least six ICS/OT disruptions due to
Protection Against Online Scams: How to Keep Your Credit Safe
Credit card fraud happens when someone steals your credit information and uses it to make purchases or borrow money. While victims of fraud don’t typically have to pay anything, the
Marriott confirms latest data breach, possibly exposing information on hotel guests, employees
Written by AJ Vicens Jul 5, 2022 | CYBERSCOOP Marriott International confirmed Tuesday that unknown criminal hackers broke into its computer networks and then attempted to extort the company, marking
Five Questions with Dr. Georgette Fraser-Moore, CompTIA’s Advancing Women in Technology Leadership Award Winner
By the time many females start to lose interest in pursuing a tech career, Dr. Georgette Fraser-Moore was already engrossed in hers. Coding as a middle schooler and taking college
Microsoft Warns of Evolving Toll Fraud Android Malware Draining Wallets
Those still using older versions of the Android operating system are at risk. Microsoft’s 365 Defender team has detected a new and evolving Android malware that targets users’ crypto wallets to steal
NIST Acknowledges First Four Quantum-Resistant Encryption Tools
The four algorithms will now become part of NIST’s post-quantum cryptographic standardRead More: https://www.infosecurity-magazine.com/news/nist-quantum-resistant-encryption/
Abortion disinformation is growing and dangerously divisive, experts say
Written by Suzanne Smalley Jul 5, 2022 | CYBERSCOOP Rep. Marjorie Taylor Greene’s Twitter account struck an urgent tone the Sunday after the Supreme Court’s historic abortion ruling. She implored
TikTok CEO Addresses US Security Concern
Shou Zi Chew claims Project Texas is intended to strengthen the company’s data security postureRead More: https://www.infosecurity-magazine.com/news/tiktok-ceo-addresses-us-security/
British Military’s Twitter and YouTube Accounts Hacked to Scam Crypto Users
The British Army has confirmed the breaching of its Twitter and YouTube accounts. On Sunday, July 3rd, the British Army confirmed that its YouTube and Twitter accounts were hacked to promote crypto
Advanced Phishing Scams Target Middle East and Impersonate UAE Ministry of Human Resources
The phishing campaign mainly targets individual job seekers and businessesRead More: https://www.infosecurity-magazine.com/news/phishing-scams-target-middle-east/
The Ukraine war could provide a cyberwarfare manual for Chinese generals eyeing Taiwan
Written by Tim Starks and AJ Vicens Jul 5, 2022 | CYBERSCOOP Military leaders around the world are closely watching Russia’s invasion of Ukraine, which just entered its fifth month,
These are the biggest cybersecurity threats. Make sure you aren't ignoring them
Image: Getty Cybersecurity is hard. Technology is continually changing, cyber criminals’ tools and techniques are always evolving and maintaining the security of a network with users who each want to
Ransomware: Why it's still a big threat, and where the gangs are going next
Image: Getty Ransomware has been a cybersecurity issue for a long time, but last year it went mainstream. Special Feature Major ransomware attacks like those on Colonial Pipeline, the Irish
These are the cybersecurity threats of tomorrow that you should be thinking about today
Image: Getty/Bloom Productions Keeping on top of cybersecurity risks is a constant challenge. Threats including phishing, malware and ransomware are continually evolving and adapting, as cyber criminals regularly find new,
Google to wipe user location history for visits to healthcare clinics, domestic violence shelters
Google says it will automatically delete location logs when it detects visits to abortion clinics and domestic violence shelters. In a blog post, Jen Fitzpatrick, senior vice president of Google
This is the ultimate security key. Here's why you need one
It’s not often that I say you absolutely need to buy something. But this is something you need to buy. Two-factor authentication — a combination of something you remember (such
Operation 404: Brazilian authorities crack down on piracy in the metaverse
Brazil’s Ministry of Justice and Public Security announced that it has carried out its first search within the metaverse as part of an operation aimed at tackling digital piracy and
Infostealer Comparison: Top Stealers in 2022
To help protect the public, Morphisec Labs constantly monitors, investigates, and assesses the latest threats to help organizations avoid serious consequences. In recent months, threats involving infostealers have escalated. This