Online Security
1 min read
41

Colonial Pipeline Paid Nearly $5 Million in Ransom to Cybercriminals

May 17, 2021
0

Colonial Pipeline on Thursday restored operations to its entire pipeline system nearly a week following a ransomware infection targeting its IT systems, forcing it to reportedly shell out nearly $5 million to regain control of its computer networks. “Following this restart, it will take several days for the product delivery

Continue Reading
Online Security
1 min read
41

Pakistan-Linked Hackers Added New Windows Malware to Its Arsenal

May 16, 2021
0

Cybercriminals with suspected ties to Pakistan continue to rely on social engineering as a crucial component of its operations as part of an evolving espionage campaign against Indian targets, according to new research. The attacks have been linked to a group called Transparent Tribe, also known as Operation C-Major, APT36,

Continue Reading
Online Security
1 min read
40

Hackers Using Microsoft Build Engine to Deliver Malware Filelessly

May 15, 2021
0

Threat actors are abusing Microsoft Build Engine (MSBuild) to filelessly deliver remote access trojans and password-stealing malware on targeted Windows systems. The actively ongoing campaign is said to have emerged last month, researchers from cybersecurity firm Anomali said on Thursday, adding the malicious build files came embedded with encoded executables

Continue Reading
Online Security
2 min read
35

Can Data Protection Systems Prevent Data At Rest Leakage?

May 14, 2021
0

Protection against insider risks works when the process involves controlling the data transfer channels or examining data sources. One approach involves preventing USB flash drives from being copied or sending them over email. The second one concerns preventing leakage or fraud in which an insider accesses files or databases with

Continue Reading
Online Security
1 min read
37

Nearly All Wi-Fi Devices Are Vulnerable to New FragAttacks

May 13, 2021
0

Three design and multiple implementation flaws have been disclosed in IEEE 802.11 technical standard that undergirds Wi-Fi, potentially enabling an adversary to take control over a system and plunder confidential data. Called FragAttacks (short for FRgmentation and AGgregation attacks), the weaknesses impact all Wi-Fi security protocols, from Wired Equivalent Privacy

Continue Reading
Online Security
2 min read
54

LIVE Webinar — The Rabbit Hole of Automation

May 12, 2021
0

The concept of automation has taken on a life of its own in recent years. The idea is nothing new, but the current interest in automation is a mix of both hype and innovation. On the one hand, it’s much easier today to automate everything from small processes to massive-scale

Continue Reading
Online Security
2 min read
41

Over 25% Of Tor Exit Relays Spied On Users’ Dark Web Activities

May 11, 2021
0

An unknown threat actor managed to control more than 27% of the entire Tor network exit capacity in early February 2021, a new study on the dark web infrastructure revealed. “The entity attacking Tor users is actively exploiting tor users since over a year and expanded the scale of their

Continue Reading
Online Security
1 min read
53

Ransomware Cyber Attack Forced the Largest U.S. Fuel Pipeline to Shut Down

May 10, 2021
0

Colonial Pipeline, which carries 45% of the fuel consumed on the U.S. East Coast, on Saturday said it halted operations due to a ransomware attack, once again demonstrating how infrastructure is vulnerable to cyberattacks. “On May 7, the Colonial Pipeline Company learned it was the victim of a cybersecurity attack,”

Continue Reading
Online Security
2 min read
51

Facebook Will Limit Your WhatsApp Features For Not Accepting Privacy Policy

May 9, 2021
0

WhatsApp on Friday disclosed that it won’t deactivate accounts of users who don’t accept its new privacy policy rolling out on May 15, adding it will continue to keep reminding them to accept the new terms. “No one will have their accounts deleted or lose functionality of WhatsApp on May

Continue Reading
Online Security
1 min read
47

4 Major Privacy and Security Updates From Google You Should Know About

May 8, 2021
0

Google has announced a number of user-facing and under-the-hood changes in an attempt to boost privacy and security, including rolling out two-factor authentication automatically to all eligible users and bringing iOS-styled privacy labels to Android app listings. “Today we ask people who have enrolled in two-step verification (2SV) to confirm

Continue Reading
Online Security
1 min read
36

Check Your Cybersecurity Skills On This New Competition Site

May 7, 2021
0

InfoSec leaders tend to be a specific type. Their jobs require them to think of possible threats, take actions that may not pay immediate results, plan for unknown security risks, and react quickly when emergencies arise, often before the morning’s first coffee. The high-stakes position also means that CISOs need

Continue Reading
Online Security
2 min read
44

New Study Warns of Security Threats Linked to Recycled Phone Numbers

May 6, 2021
0

A new academic study has highlighted a number of privacy and security pitfalls associated with recycling mobile phone numbers that could be abused to stage a variety of exploits, including account takeovers, conduct phishing and spam attacks, and even prevent victims from signing up for online services. Nearly 66% of

Continue Reading
Online Security
1 min read
36

LuckyMouse Hackers Target Banks, Companies and Governments in 2020

May 5, 2021
0

An adversary known for its watering hole attacks against government entities has been linked to a slew of newly detected intrusions targeting various organizations in Central Asia and the Middle East. The malicious activity, collectively named “EmissarySoldier,” has been attributed to a threat actor called LuckyMouse, and is said to

Continue Reading
Online Security
1 min read
39

A Rust-based Buer Malware Variant Has Been Spotted in the Wild

May 4, 2021
0

Cybersecurity researchers on Monday disclosed a new malspam campaign distributing a fresh variant of a malware loader called ‘Buer’ written in Rust, illustrating how adversaries are constantly honing their malware toolsets to evade analysis. Dubbed “RustyBuer,” the malware is propagated via emails masquerading as shipping notices from DHL Support, and

Continue Reading
Online Security
1 min read
44

Microsoft Finds ‘BadAlloc’ Flaws Affecting Wide-Range of IoT and OT Devices

May 3, 2021
0

Microsoft researchers on Thursday disclosed two dozen vulnerabilities affecting a wide range of Internet of Things (IoT) and Operational Technology (OT) devices used in industrial, medical, and enterprise networks that could be abused by adversaries to execute arbitrary code and even cause critical systems to crash. “These remote code execution

Continue Reading
Online Security
1 min read
41

A New Slack channel for Cybersecurity Leaders Outside of the Fortune 2000

May 2, 2021
0

Perhaps due to the nature of the position, the InfoSec leadership roles tend to be solitary ones. CISOs, or their equivalent decision-makers in organizations without the role, have so many constant drains on their attention – keeping their knowledge fresh, building plans to secure their organizations further – that they

Continue Reading
Online Security
1 min read
39

Hackers Exploit SonicWall Zero-Day Bug in FiveHands Ransomware Attacks

May 1, 2021
0

An “aggressive” financially motivated threat group tapped into a zero-day flaw in SonicWall VPN appliances prior to it being patched by the company to deploy a new strain of ransomware called FIVEHANDS. The group, tracked by cybersecurity firm Mandiant as UNC2447, took advantage of an “improper SQL command neutralization” flaw

Continue Reading
Online Security
1 min read
44

Researchers Uncover Stealthy Linux Malware That Went Undetected for 3 Years

April 30, 2021
0

A previously undocumented Linux malware with backdoor capabilities has managed to stay under the radar for about three years, allowing the threat actor behind the operation to harvest and exfiltrate sensitive information from infected systems. Dubbed “RotaJakiro” by researchers from Qihoo 360 NETLAB, the backdoor targets Linux X64 machines, and

Continue Reading