Microsoft Autodiscover protocol leaking credentials: How it works
The Microsoft Exchange Autodiscover protocol is a protocol that has been around for years. But with recent claims that it might be leaking credentials to anyone who is listening to
Only half of organizations reviewed security policies due to the pandemic: study
New research suggests that only half of organizations worldwide reviewed their cybersecurity policies when COVID-19 hit. The COVID-19 pandemic prompted a rapid shift to working from home. Whereas organizations would
Protect your privacy with a Scout Hidden Camera Detector for just $60
StackCommerce The increased frequency and severity of cyber-attacks have made most people more careful about staying safe when going online. However, our physical safety is every bit as critical as
Consumers Increasingly Numb to Data Breach Risks
Trust in organizations hits rock bottom but many don’t careRead More: https://www.infosecurity-magazine.com/news/consumers-increasingly-numb-to/
Mirai Malware Distributed by Means of Spring4Shell Vulnerability
Threat actors have been detected using the Spring4Shell vulnerability to install malware on victim PCs, according to security researchers. More Details on the Spring4Shell Vulnerability According to ZDNet, the Spring4Shell
Hospital hallway robots get patches for potentially serious bugs
Written by Joe Warminsky Apr 12, 2022 | CYBERSCOOP Rolling robots used at hospitals for a variety of tasks — including transporting medication — have been patched for five vulnerabilities
Best Practices in Patch Management for Cloud Workload Security
Over the past decade, organizations of all sizes have been increasingly migrating their workloads and IT infrastructure to the cloud. From the way mobile and content services are delivered and
Terrible cloud security is leaving the door open for hackers. Here's what you're doing wrong
Read More: https://www.zdnet.com/article/terrible-cloud-security-is-leaving-the-door-open-for-hackers-heres-what-youre-doing-wrong/#ftag=RSSbaffb68
Zegna Confirmed Ransomware Attack
A major luxury menswear brand and one of the most known enterprises in Italy, the Ermenegildo Zegna Group, is comprised of the Ermenegildo Zegna and Zegna SpA companies. Zegna was
Calls to Banks Customer Support Intercepted by Fakecalls Mobile Banking Trojan
Fakecalls, an Android banking malware, has a powerful feature that allows it to hijack calls to a bank’s customer service number and connect the target directly with the malware’s operators.
This Windows malware aims to steal your social media passwords
Cybersecurity researchers at Zscaler are warning about malware dubbed FFDroider that is designed to steal usernames and passwords, along with cookies from infected Windows computers. FFDroider is mainly focused on stealing login credentials for
Patch Tuesday April 2022 – Microsoft Releases Fixes for 26 Vulnerabilities, Including 5 Rated as Important
During the April Patch Tuesday bout, Microsoft has released a total number of 26 fixes for common and less common vulnerabilities. Microsoft has also addressed five vulnerabilities that were labeled
US Government Has Three Weeks to Patch Cyclops Blink Bug
CISA adds WatchGuard flaw to its Known Exploited Vulnerabilities CatalogRead More: https://www.infosecurity-magazine.com/news/us-government-patch-cylops-blink/
Europol Announces Operation to Hit Russian Sanctions-Evaders
Money launderers will be firmly in the sights of EU policeRead More: https://www.infosecurity-magazine.com/news/europol-hit-russian/
Protected: Cyber Dialogue: A-UK-US heavyweights talk Russia’s invasion and cyber implications
Read More: https://cybercx.com.au/cyber-security-resources/cyber-dialogue-a-uk-us-heavyweights-talk-russias-invasion-and-cyber-implications/?utm_source=rss&utm_medium=rss&utm_campaign=cyber-dialogue-a-uk-us-heavyweights-talk-russias-invasion-and-cyber-implications
Anonymous Hits 3 Russian Entities, Leaks 400 GB Worth of Emails
Anonymous has taken Operation OpRussia a step further by targeting Aerogas, Forest, and Petrovsky Fort, which happened to be giants in their respective industries. The online hacktivist collective Anonymous has
Google files suit against Cameroonian cybercriminal who used puppies as lures
Written by AJ Vicens Apr 11, 2022 | CYBERSCOOP Google filed a lawsuit Monday against a Cameroonian man, accusing him of creating scam websites that promise to “sell adorable puppies,”
Microsoft Takes Down Domains Used in Cyberattack Against Ukraine
The APT28 (Advanced persistence threat) is operating since 2009, this group has worked under different names such as Sofacy, Sednit, Strontium Storm, Fancy Bear, Iron Twilight, and Pawn. Microsoft seized
SuperCare Data Breach Involves More Than 300,000 Individuals
California-based respiratory care provider SuperCare Health discovered the incident on July 27 2021Read More: https://www.infosecurity-magazine.com/news/supercare-data-breach-300000/
EU Officials Targeted with Pegasus Spyware
Pegasus spyware was allegedly used to spy on the current European Justice CommissionerRead More: https://www.infosecurity-magazine.com/news/eu-officials-pegasus-spyware/
Turning Inspiration into Innovation: Emerging Technology Trends in Managed Services for 2022
Whether it’s blockchain, artificial intelligence, drones, or beyond, emerging technologies pique imaginations and jumpstart business owners’ thoughts about innovation and money-making potential. Count MSPs among the inspired. And yet, turning
FOX News Exposed 13 Million Sensitive Records Online
The incident was caused due to database misconfiguration in which FOX News exposed around 58 GB worth of data without any security authentication. The IT security researchers at Website Planet
Federal prosecutors going after alleged Russian hacker mistakenly turn over unrelated case documents, lawyer says
Written by AJ Vicens Apr 11, 2022 | CYBERSCOOP Federal prosecutors working the insider trading and hacking case against a Russian millionaire extradited to the U.S. in December inadvertently gave
XSS vulnerability patched in Directus data engine platform
A cross-site scripting (XSS) vulnerability has been patched in the popular Directus engine. Directus is an open source, modular content management system (CMS) promoted as a “flexible powerhouse for engineers.”
Octo Android Malware Can Take Over Your Device
Octo, a recently discovered Android banking trojan with remote access capabilities that allows cybercriminals to commit on-device fraud, has been observed in the wild. Octo was discovered by ThreatFabric security
IRQLs Close Encounters of the Rootkit Kind
IRQL Overview Present since the early stages of Windows NT, an Interrupt Request Level (IRQL) defines the current hardware priority at which a CPU runs at any given time. On
Spring4Shell flaw is now being used to spread this botnet malware
Security researchers have observed attackers exploiting the Spring4Shell Java-related flaw to install malware on target systems. Researchers at security firms Trend Micro and Qihoo 360 watched the attacks emerge
Conti’s Leaked Ransomware Used to Target Russian Businesses
Conti’s source code was exposed after the company allied with Russia in the Ukraine conflict, and a security researcher obtained 170,000 internal chat messages as well as the source code
Why you might consider working with an MSP to obtain cyber insurance
Cyber insurance is quickly becoming one of the most essential cybersecurity services available to an organization. Unlike traditional services that offer defense, proactive threat hunting, or reactive remediation, cyber insurance
New Meta Malware Used in Malspam Campaign
A new META malware, an info-stealer that seems to be more and more popular among hackers, has been discovered being leveraged by threat actors in a recent malspam campaign. What
Why you need to install and use Instagram story saver
It is quite difficult to deny the fact that we live in the age of the Internet. According to analytics firm App Annie, a person currently interacts with their mobile
Fraudsters Steal £58m in 2021 Via Remote Access Tools
Victims often receive an unsolicited call firstRead More: https://www.infosecurity-magazine.com/news/fraudster-steal-58m-2021-via/
Raspberry Pi Ditches Default Logins to Boost Security
Users asked to choose new username and password on boot-upRead More: https://www.infosecurity-magazine.com/news/raspberry-pi-default-logins-boost/
FIN7 Pen Tester Gets Five Years Behind Bars
Carbanak Group specialist coordinated network intrusionsRead More: https://www.infosecurity-magazine.com/news/fin7-pen-tester-gets-five-years/
Managed Security Service – What It Is and Why Does Your Company Need It
The unification revolution of cybersecurity solutions has started – and managed security service providers are leading the way. Managed security services (MSS) refer to a service model or capability offered
Singapore begins licensing cybersecurity vendors
Vendors offering two categories of cybersecurity services in Singapore now must apply for a licence to continue providing such services. They have up to six months to do so or
OpenSSH now defaults to protecting against quantum computer attacks
Post-quantum cryptography has arrived by default with the release of OpenSSH 9 and the adoption of the hybrid Streamlined NTRU Prime + x25519 key exchange method. “The NTRU algorithm is
Ads, NFTs and other badness: Pour one out for the decline of dumb TVs
Image: Vizio In my particular lounge room sits a relic of a time long gone, a 15-year-old plasma TV that is dumb as a box of hammers, and thankfully so.
FBI Disrupts Cyclops Blink Botnet Used by Russian Intelligence Directorate
According to US authorities, the Cyclops Blink botnet was controlled by the Russian Federation’s Main Intelligence Directorate (GRU) and had compromised thousands of devices worldwide. A court-authorized operation against a
FBI Disrupts Cyclops Blink Botnet Used by Russian Intelligence Directorate
According to US authorities, the Cyclops Blink botnet was controlled by the Russian Federation’s Main Intelligence Directorate (GRU) and had compromised thousands of devices worldwide. A court-authorized operation against a
Threat Roundup for April 1 to April 8
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between April 1 and April 8. As with previous roundups, this post isn’t meant to be an
DOJ's Sandworm operation raises questions about how far feds can go to disarm botnets
Written by Suzanne Smalley Apr 8, 2022 | CYBERSCOOP The notion that citizens are protected from unreasonable search and seizure is a bedrock legal principle: A court must issue a
Denial-of-service disrupts Finnish government sites during Zelenskyy speech
Written by Tim Starks Apr 8, 2022 | CYBERSCOOP A denial-of-service attack knocked the websites for Finland’s defense and foreign ministries offline Friday, the government there said, just as Ukrainian
Google Play Bitten by Sharkbot Info-stealer ‘AV Solution’
Google removed six different malicious Android applications targeting mainly users in the U.K. and Italy that were installed about 15,000 times. Researchers have found the info-stealing Android malware Sharkbot lurking
Northern Ireland TrustFord Sites Hit by Ransomware Gang
The attack is believed to have been committed by Conti ransomware gangRead More: https://www.infosecurity-magazine.com/news/northern-ireland-trustford/
Finland Government Sites Forced Offline by DDoS Attacks
Finnish ministries of foreign affairs and defense forced offline earlier today by DDoS attacksRead More: https://www.infosecurity-magazine.com/news/finland-government-sites-offline/
The Best Virtual Desktop Solutions You Might Need in 2022
Desktop virtualization is a term that refers to a software solution that isolates the desktop environment and any related application software from the client device used to access the desktop
APT-C-23 Hacking Group Targets Israeli Officials in Catfish Campaign
Hamas-linked cybercrime organization dubbed ‘APT-C-23’ was noticed catfishing Israeli officials working in defense, law, enforcement, and government institutions, resulting in the deployment of new malware. The operation employs high-level social