Threat Source newsletter (May 5, 2022) — Emotet is using up all of its nine lives
By Jon Munshaw. Welcome to this week’s edition of the Threat Source newsletter. Emotet made headlines last week for being “back” after a major international law enforcement takedown last year. But
Hunter Biden Laptop Repairman Sues Over Hacker Allegations
Repairman sues politician and news media for allegedly calling him a hacker and a Russian asset Read More: https://www.infosecurity-magazine.com/news/hunter-biden-laptop-lawsuit/
India to Collect User Data from VPNs, Data Centers, and Cloud Service Providers
The Indian government recently passed a new law that mandates all internet service providers to collect and store user data for the past five years. As per the press release
India to Collect User Data from VPNs, Crypto, Data Centers, and Cloud Service Providers
The Indian government recently passed a new law that mandates all internet service providers to collect and store user data for the past five years. As per the press release
GitHub to Enforce Two-Factor Authentication
Code hosting platform to make 2FA mandatory for all code contributors by the end of 2023Read More: https://www.infosecurity-magazine.com/news/github-to-enforce-2fa/
It's World Password Day! Here's the one simple tip you need to keep your accounts secure online
Written by Adrian Kingsley-Hughes, Contributor Adrian Kingsley-Hughes Contributor Adrian Kingsley-Hughes is an internationally published technology author who has devoted over two decades to helping users get the most from technology
Illuminate Data Breach Impacts More School Districts
Colorado now affected by incident that compromised data of 820,000 NYC students Read More: https://www.infosecurity-magazine.com/news/illuminate-breach-impacts-school/
Chinese State-Sponsored APT Naikon Resurfaces with New Tactics, Techniques, and Procedures (TTPs).
Naikon, a Chinese-state-sponsored Advanced Persistent Threat (APT) undergoes scrutiny once again following the discovery of a new set of TTPs (Tactics, Techniques, and Procedures). Although the group’s motivation remains unknown,
FBI: Email fraud keeps getting worse. Here's how to protect yourself
The FBI has warned that business email compromise (BEC) fraud has cost businesses around the world $43 billion in losses in the period between June 2016 and December 2021. The
Vendor Email Compromise (VEC) Explained
You may know what BEC (Business Email Compromise) is, but have you heard of VEC (Vendor Email Compromise)? If your business transacts with vendors to supply products or services, VEC
More Than a Buzz Word: vCom Solutions’ DEI Journey
A simple Google search for “DEI” yields more than 176 million news articles, supporting the claim that the term diversity, equity and inclusion (DEI) is being used far and wide.
White House: Quantum computers could crack encryption, so here's what we need to do
The White House has announced a set of proposals for keeping the US ahead of quantum computing race globally, while mitigating the risk of quantum computers that can break public-key
Cloudflare Successfully Thwarted One of The Largest DDoS Attacks
Cloudflare explained that it wasn’t the largest application-layer attack but the largest ever noted in the HTTPS category. Internet Infrastructure company Cloudflare has mitigated one of the world’s largest distributed
CANs Reinvent LANs for an All-Local World
A close look at a new type of network, known as a Cloud Area Network. In an article I wrote over a year ago called “Securing the New Normal of
F5 Warns of Critical Bug Allowing Remote Code Execution in BIG-IP Systems
The vulnerability is ‘critical’ with a CVSS severity rating of 9.8 out of 10. Application service provider F5 is warning a critical vulnerability allows unauthenticated hackers with network access to execute
Latest Cohort Announced for NCSC For Startups
The new cohort was chosen for their innovative approaches to tackling the growing ransomware threatRead More: https://www.infosecurity-magazine.com/news/cohort-ncsc-startups/
VHD Ransomware Linked to North Korea’s Lazarus Group
Source code and Bitcoin transactions point to the malware, which emerged in March 2020, being the work of APT38, researchers at Trellix said. Cryptocurrency thief Lazarus Group appears to be
UK National Health Service Email Accounts Compromised by Hackers to Steal Microsoft Logins
For about six months, more than 100 National Health Service (NHS) employees in the United Kingdom had their email accounts used in various phishing attacks, some of which intended to
Mustang Panda deploys a new wave of malware targeting Europe
By Jung soo An, Asheer Malhotra and Justin Thattil, with contributions from Aliza Berk and Kendall McKay. In February 2022, corresponding roughly with the start of the Russian Invasion of
Google, Apple, Microsoft make a new commitment for a “passwordless future”
Sometime this year or next, we may finally get to say goodbye to our passwords. Google, Apple and Microsoft have all extended their commitment to building passwordless support into their
A security researcher told me my passwords and more: How 15 years of digital footprints left me exposed
The internet does not like to forget. Many of us know this, or at least it’s something that’s in the backs of our minds as we post updates to Facebook,
More details emerge on China's widespread Ukraine-related hacking efforts
Written by AJ Vicens May 5, 2022 | CYBERSCOOP More details are emerging about the activities of a prolific Chinese government hacking group and how it’s used Russia’s invasion of
BIG-IP RCE Bug Could Allow Device Takeover
F5 Networks is a leading provider of enterprise networking gear, with software and hardware customers like governments, Fortune 500 firms, banks, internet service providers, and largely known consumer brands (Microsoft,
Decade-old bugs discovered in Avast, AVG antivirus software
Researchers have disclosed two high-severity vulnerabilities in Avast and AVG antivirus products which have gone undetected for ten years. On Thursday, SentinelOne published a security advisory on the flaws, tracked
South Korea Admitted to NATO Cyber Defense Center
Country becomes first Asian nation to join the groupRead More: https://www.infosecurity-magazine.com/news/south-korea-admitted-to-nato-cyber/
NHS Inboxes Hijacked to Send 1000+ Malicious Emails
Phishing campaign relied on individually compromised users Read More: https://www.infosecurity-magazine.com/news/nhs-inboxes-hijacked-send-1000/
FBI: Thailand and Hong Kong Banks Used Most in BEC
Email compromise could be a $43bn problemRead More: https://www.infosecurity-magazine.com/news/fbi-thailand-hong-kong-banks-bec/
Federal Court finds RI Advice failed to manage cybersecurity risks in landmark decision
on May 4, 2022 | Topic: Legal In an Australian first, the Federal Court has found that financial services firm RI Advice breached its licence obligations by failing to implement
VM escape and root access bugs fixed in Cisco NFV infrastructure software
Written by Chris Duckett, APAC Editor Chris Duckett APAC Editor Chris started his journalistic adventure in 2006 as the Editor of Builder AU after originally joining CBS as a programmer.
Avast Q1/2022 Threat Report
Avast – Cyberwarfare between Ukraine and Russia The first quarter of 2022 is over, so we are here again to share insights into the threat landscape and what we’ve seen
How the EPL tackles piracy and stops people going around the wall
Written by Aimee Chanthadavong, Senior Journalist Aimee Chanthadavong Senior Journalist Since completing a degree in journalism, Aimee has had her fair share of covering various topics, including business, retail, manufacturing,
NetDooka Framework Distributed via PrivateLoader Malware as Part of Pay-Per-Install Service
Trend Micro – NetDooka Framework Distributed via PrivateLoader Malware as Part of Pay-Per-Install Service Malware This report focuses on the components and infection chain of the NetDooka framework. Its scope
Nakasone says Cyber Command did nine 'hunt forward' ops last year, including in Ukraine
Written by Suzanne Smalley May 4, 2022 | CYBERSCOOP National Security Agency Director and U.S. Cyber Command Gen. Paul Nakasone said Tuesday that Cyber Command conducted nine “hunt forward” operations
Kubernetes 1.24 Stargazer: An exceptional release with two major changes
Kubernetes, everyone’s favorite container orchestrator, in its latest release, Kubernetes 1.24 Stargazer, has made two major changes: The developers dropped support for the Docker Engine container runtime and added supply
China-linked APT Caught Pilfering Treasure Trove of IP
A state-sponsored threat actor designed a house-of-cards style infection chain to exfiltrate massive troves of highly sensitive data. Researchers from Cybereason’s Nocturnus Team have uncovered a massive, highly successful, three-year-long
Groundbreaking Cybersecurity Book Published
First cybersecurity book written exclusively by women and non-binary experts publishedRead More: https://www.infosecurity-magazine.com/news/groundbreaking-cybersecurity-book/
Russian ransomware group claims attack on Bulgarian refugee agency
Written by AJ Vicens May 4, 2022 | CYBERSCOOP A ransomware group believed to have strong ties within Russia said Wednesday that it will release files it took from the
SIM Fraud Solution Sparks Privacy Fears
Concerns raised over South Africa’s proposal to tie people’s biometric data to their SIM cards Read More: https://www.infosecurity-magazine.com/news/sim-fraud-solution-sparks-privacy/
HHS Information Security Program 'Not Effective'
Office of Inspector General slams department’s security program four years running Read More: https://www.infosecurity-magazine.com/news/hhs-information-security-program/
GitHub launches new 2FA mandates for code developers, contributors
GitHub is introducing new rules surrounding developers and two-factor authentication (2FA) security. On Wednesday, the Microsoft-owned code repository said that changes will be made to existing authentication rules as “part
UK to Place Security Requirements on App Developers and Store Operators
Under the proposals, all app stores would be required to commit to a new code of practiceRead More: https://www.infosecurity-magazine.com/news/uk-security-app-developers-store/
Kubernetes taps Sigstore to thwart open-source software supply chain attacks
Container orchestrator Kubernetes will now include cryptographically signed certificates, using the Sigstore project created last year by the Linux Foundation, Google, Red Hat and Purdue University in a bid to
Ransomware Defense: How to Boost Microsoft Defender
Ransomware attacks have never been more dangerous, or prolific. 2020 was described by security experts and media outlets as the “worst year ever for ransomware.” Then ransomware attacks grew by
Attackers Use Event Logs to Hide Fileless Malware
A sophisticated campaign utilizes a novel anti-detection method. Researchers have discovered a malicious campaign utilizing a never-before-seen technique for quietly planting fileless malware on target machines. The technique involves injecting
HermeticWiper malware used against Ukraine
Data-wiping malware dubbed HermeticWiper has impacted hundreds of machines and networks geolocated in Ukraine. It is malware used not just to infect machines but also to destroy them. HermeticWiper has
Arrests Made in Relation to LAPSUS$ Cyber Gang
Security Intelligence – Arrests Made in Relation to LAPSUS$ Cyber Gang Home / News Arrests Made in Relation to LAPSUS$ Cyber Gang Share The cyber criminal organization LAPSUS$ has claimed responsibility
Join Bitdefender at CyberTech Europe 2022 | Exploring Best Practices in Cloud Security, Zero Trust, and More
The enterprise cybersecurity landscape has changed dramatically in recent years. The COVID-19 pandemic spurred a rapid, global shift to remote and hybrid work, accelerating digital transformation initiatives and the widespread
Anonymous Leak 82GB of Police Emails Against Australia’s Offshore Detention
In total, Anonymous leaked 285,635 confidential emails belonging to the Nauru Police Force of the tiny Nauru Island infamously known for being used by Australia as an offshore refugee detention