Obama says he underestimated the threats posed by disinformation
Written by Suzanne Smalley Apr 7, 2022 | CYBERSCOOP Former President Barack Obama said Wednesday that during his presidency he did not foresee how rampant disinformation would pose threats to
#SecureLondon: Defining Cyber Roles Critical to Tackling Skills Shortage
Chris Ensor, deputy director, NCSC, highlights the need to provide clarity around the skills required for specific cybersecurity rolesRead More: https://www.infosecurity-magazine.com/news/securelondon-cyber-roles-skills/
Parrot TDS takes over web servers and threatens millions
Avast – A new Traffic Direction System (TDS) we are calling Parrot TDS, using tens of thousands of compromised websites, has emerged in recent months and is reaching users from
The Conti Group Still in Business Regardless of the Data Leak It Faced
Apparently, the Conti ransomware group is still operational and waging cyberattacks against victims worldwide, regardless of the fact that their activities had been previously leaked online. Conti Still in the
How to Clear Your DNS Cache on Windows, macOS, Linux, and Chrome
A clear DNS cache is an easy way to solve connectivity issues, as well as prevent some of the most widely-encountered DNS-based cyberattacks. But how can you do that on
New FFDroider Malware Is Targeting Social Media Platform Users
FFDroider, a recently discovered information stealer malware, steals credentials and cookies saved in web browsers in order to hijack targets’ Facebook, Instagram, and Twitter accounts. Cybercriminals love social media accounts,
These Android users wanted to protect their phones from hackers. Instead they downloaded malware.
Six phony anti-virus apps have been removed from the Google Play app store because instead of protecting users from cyber criminals, they were actually being used to deliver malware to
The Works Hit by Massive Cyberattack
PLC (also known as TheWorks.co.uk PLC) is a discount retailer with headquarters in the United Kingdom that distributes a wide variety of products such as books, art and craft supplies,
Half of Security Leaders Consider Quitting Due to Stress
Vectra study finds many are seeking help for stress-related issuesRead More: https://www.infosecurity-magazine.com/news/half-security-leaders-consider/
Microsoft: Windows Autopatch is coming soon. Here's what you need to know
Microsoft is rolling out an automatic Windows and Office software update service to its enterprise customers, which aims to turn ‘Patch Tuesday’ into just another Tuesday. Microsoft is releasing Windows
Employee Info Among 13 Million Records Leaked by Fox News
Researchers discover database exposed through misconfigurationRead More: https://www.infosecurity-magazine.com/news/employee-info-13-million-records/
VMware warns of critical remote code execution bug in Workspace ONE Access
VMware is urging customers to update their software to resolve critical vulnerabilities, including a remote code execution (RCE) bug in Workspace ONE Access. On Wednesday, the tech giant published a
US Action Disrupts Russian Botnet Cyclops Blink
Coordinated effort removes malware from C&C devicesRead More: https://www.infosecurity-magazine.com/news/us-action-disrupts-russian-botnet/
Java Spring4Shell flaw exploit attempts: These are the industries most affected
The sector most heavily impacted by the Spring4Shell Java flaw is technology, according to security firm Check Point. Spring4Shell is a bug worth paying attention to and could be a
Zoom awarded $1.8 million in bug bounty rewards over 2021
Zoom has awarded $1.8 million to researchers who submitted bug bounty reports over 2021. Bug bounty programs, whether private and available to invitees-only or public, where anyone can submit a
Fighting crime doesn't justify mandatory data retention: European Court of Justice
The European Court of Justice (ECJ) has effectively banned the general use of telecommunications data retention for combating crime across the European Union. In a judgment delivered by the ECJ’s
Israeli officials are being catfished by AridViper hackers
High-ranking Israeli officials are being catfished in a new cyberespionage campaign launched by AridViper. AridViper, also known as APT-C-23, Desert Falcon, and Two-tailed Scorpion, is a politically-driven advanced persistent threat
Cryptocurrency has overtaken bank transfers for payments into investment scams: ACCC
Image: Visuals6x — Shutterstock Losses from Australians to investment scams increased by 90% to AU$103 million from the start of the year to March 20, with the Australian Competition and
ASD says not all of Australia's 1,900 REDSPICE jobs will be for cyber
Image: Getty Images The 1,900 new jobs promised in the federal government’s new AU$ 9.9 billion cyber program will not solely be in the areas of cybersecurity and IT, Australian
5 Common Database Management Challenges & How to Solve Them
Since nearly every application or tool in your tech stack connects to a database, it’s no surprise that 57% of organizations find themselves constantly managing database challenges. Storing and accessing
Sky Mavis raises $150 million to refund users after Ronin network attack
Image: Jam Sta Rosa/AFP via Getty Images Vietnamese blockchain game company Sky Mavis and makers of the play-to-earn game Axie Infinity have announced a $150 million fundraising round to help
DoJ takes down Russian botnet that targeted WatchGuard and Asus routers
The US Justice Department in March carried out an operation that successfully removed malware known as “Cyclops Blink” from vulnerable internet-connected firewall devices, the department announced Wednesday. The operation disrupted
How to block tracking pixels in Apple Mail
Third-party entities go out of their way to collect data from you. In your web browser they use tracking cookies extensively and nearly every browser on the market goes to
Anonymous Affiliate NB65 Breach State-Run Russian Broadcaster; Leak 786GB of Data
The data leaked by the Anonymous affiliate group contains 4,000 files and more than 900,000 emails from Russian state-run television and radio broadcaster VGTRK (aka All-Russia State Television and Radio
Attack on Ukraine Telecoms Provider Caused by Compromised Employee Credentials
Ukrtelecom claimed Russian hackers launched the attacks after compromising the credentials of an employee in an occupied area of the countryRead More: https://www.infosecurity-magazine.com/news/attack-ukraine-telecoms-employee/
Best VPN for streaming (2022)
Image: Glenn Carstens Peters via Unsplash This is a sensitive topic. Owners of entertainment content go to great lengths to control the distribution of their wares, especially when it comes
Electric Vehicle Chargers Hacked to Show Porn
Screens on charge points in Isle of Wight council car parks hacked to show explicit contentRead More: https://www.infosecurity-magazine.com/news/electric-vehicle-chargers-hacked/
US says it disrupted Russian botnet 'before it could be weaponized'
Written by Joe Warminsky Apr 6, 2022 | CYBERSCOOP The U.S. government disrupted a botnet attributable to Russia’s GRU intelligence agency before it could be used for malicious purposes, Attorney
Bitdefender Recognized as a Strong Performer in Endpoint Detection and Response
Every endpoint in an organization – from employee computers and mobile devices, to servers, cloud workloads and containers – is an entryway through which attackers can gain access and potentially
How to remove ransomware: Best free decryption tools and resources
Ransomware refers to malicious software that encrypts all of the data in your computer’s operating system and then proceeds to demand a ransom to decrypt the encrypted data. The commonly
Attackers Spoof WhatsApp Voice-Message Alerts to Steal Info
Threat actors target Office 365 and Google Workspace in a new campaign, which uses a legitimate domain associated with a road-safety center in Moscow to send messages. Attackers are spoofing
This new malware targets AWS Lambda environments
A new malware variant that targets AWS Lambda has been discovered. On Wednesday, researchers from Cado Security published their findings on Denonia, malware currently being used in targeted attacks against
Ransomware: Conti gang is still in business, despite its own massive data leak
The Conti ransomware gang is still actively running campaigns against victims around the world, despite the inner workings of the group being revealed by data leaks. One of the most
Microsoft: Here are the key Windows 11 security upgrades coming your way
Microsoft claims that Windows 11 will bring major security improvements and had detailed a number of them, Not many businesses are using Windows 11 right now because of the high
Russian Darknet Marketplace Hydra Shutdown by The US DOJ
Hydra Market, one of the largest dark web marketplaces in the world, has been shut down by the US Department of Justice (DOJ). Hydra’s servers and cryptocurrency wallets holding $25
CashApp Customers Affected by Data Breach
Developed by Block, Inc., Cash App is a mobile payment service that enables customers to send money to one another using a mobile phone application. Currently, the service is only
VLC Media Player Leveraged by Hackers to Distribute Malware Loader
A lasting malicious campaign employed by threat actors linked to the Chinese government has been recently discovered by security experts. Its purpose is the launching of a custom malware loader
These sneaky hackers hid inside their victims' networks for nine months
A hacking and cyber espionage operation is going after victims around the world in a widespread campaign designed to snoop on targets and steal information. Identified victims of the cyber
Google increases its bug bounty for Fitbit and Nest security flaws
Google has upgraded its Vulnerability Rewards Program (or VRP) with more reward payments for hackers who find bugs in its Nest devices and those from Fitbit which it bought in January
Fake Android shopping apps steal bank account logins, 2FA codes
Researchers say that malicious Android applications disguised as legitimate shopping apps are stealing Malaysian bank customers’ financial data. On Wednesday, ESET’s cybersecurity team published new research documenting three separate apps
Almost a Fifth of Global Firms Targeted with Spring4Shell
New vulnerability exploited most widely in EuropeRead More: https://www.infosecurity-magazine.com/news/fifth-global-firms-targeted/
South African and US Officers Swoop on Fraud Gang
Seven alleged scammers arrested in JohannesburgRead More: https://www.infosecurity-magazine.com/news/south-african-us-officers-fraud/
Block Warns Eight Million Customers of Insider Breach
Payments giant says Cash App customers may be impactedRead More: https://www.infosecurity-magazine.com/news/block-warns-eight-million-insider/
Singapore moots bill to slap banks with higher fines for security breach
Singapore has taken another step towards a new bill that seeks to impose higher penalties on financial institutions that suffer a security breach as a result of oversight. It also
Block admits former employee was behind Cash App US customer data breach
Block, formerly known as Square, has confirmed a data breach that involved a former employee downloading reports from its bitcoin-enabled Cash App that contained information about its US customers. In
US Justice Department shuts down Russian dark web marketplace Hydra
Getty Images The US Department of Justice (DOJ) has shut down Hydra Market, one of the world’s largest darknet marketplaces. On Tuesday, the DOJ and German federal police seized Hydra’s
Detecting Exploitation of Local Vulnerabilities Through Trend Micro Vision One™ and Cloud One™
Trend Micro – Detecting Exploitation of Local Vulnerabilities Through Trend Micro Vision One and Cloud One Exploits & Vulnerabilities We provide a guide to detecting Dirty Pipe, a Linux kernel
An In-Depth Look at ICS Vulnerabilities Part 3
Trend Micro – The items on this chart are showing what percentages of ICS-affecting vulnerabilities identified by 2021 advisories are caused by what kind of weaknesses – “flaws, faults, bugs,