Warlock Ransomware Hitting Victims Globally Through SharePoint ToolShell Exploit Information Security Magazine 1 month 1 week ago Trend Micro highlighted a sophisticated post-compromise attack chain to deploy the Warlock ransomware in unpatched SharePoint on-prem environments
Executives Warned About Celebrity Podcast Scams Information Security Magazine 1 month 1 week ago The Better Business Bureau is urging business owners and influencers not to fall for a new type of podcast scam
UK Retreats on Apple Encryption Backdoor Demand Following US Pressure Information Security Magazine 1 month 1 week ago US director of national intelligence, Tulsi Gabbard, stated that her government persuaded the UK to withdraw its controversial demand
Microsoft Issues Out-of-Band Update to Fix Recovery Issues Information Security Magazine 1 month 1 week ago Microsoft has issued an emergency patch to fix Windows recovery problems for some users
ISACA Launches AI-Centric Security Management Certification Information Security Magazine 1 month 1 week ago ISACA has launched the new AAISM certification to equip security leaders with AI risk management expertise
Public Exploit Released for Critical SAP NetWeaver Flaw Information Security Magazine 1 month 1 week ago A critical flaw in SAP NetWeaver AS Java is being widely exploited, allowing unauthenticated remote code execution
Allianz Life Data Breach Exposes Personal Data of 1.1 Million Customers Information Security Magazine 1 month 1 week ago A cyber-attack on Allianz Life, linked to the ShinyHunters group, has exposed the personal information of 1.1 million customers
Canadian Financial Regulator Hacked, Exposing Personal Data from Member Organizations Information Security Magazine 1 month 1 week ago The Canadian Investment Regulatory Organization (CIRO) said it will work to identify the personal information breached and notify those affected
Attacker “Patches” Vulnerability Post Exploitation to Lock Out Competition Information Security Magazine 1 month 1 week ago Red Canary observed the novel tactic in a cluster of activity targeting a legacy vulnerability to access cloud-based Linux systems
Legitimate Chrome VPN Extension Turns to Browser Spyware Information Security Magazine 1 month 1 week ago Researchers detected that FreeVPN.One, a longstanding Chrome Web Store VPN extension, recently turned into spyware
South Yorkshire Police Deletes 96,000 Pieces of Digital Evidence Information Security Magazine 1 month 1 week ago South Yorkshire Police have been reprimanded by the ICO after deleting 96,000 pieces of evidence from officers’ bodycams
Australian ISP iiNet Suffers Breach of 280,000+ Records Information Security Magazine 1 month 1 week ago Over 280,000 customers of Australian ISP iiNet have been impacted by a data breach
Popular npm Package Compromised in Phishing Attack Information Security Magazine 1 month 1 week ago An incident involving the npm package eslint-config-prettier has been uncovered spreading Scavenger RAT
USB Malware Campaign Spreads Cryptominer Worldwide Information Security Magazine 1 month 1 week ago A multi-stage attack delivered via USB devices has been observed installing cryptomining malware using DLL hijacking and PowerShell
Chinese APT Group Targets Web Hosting Services in Taiwan Information Security Magazine 1 month 1 week ago Cisco Talos observed the newly identified group compromise a Taiwanese web hosting provider to conduct a range of malicious activities
Colt Customers Face Prolonged Outages After Major Cyber Incident Information Security Magazine 1 month 1 week ago The Warlock ransomware gang has taken credit for the cyber-attack after the UK telco giant publicly confirmed an incident on August 14
Man Jailed for 20 Months After Compromising Millions of Accounts Information Security Magazine 1 month 1 week ago Al-Tahery Al-Mashriky has been sentenced to 20 months behind bars for hacktism-related offenses
Workday Reveals CRM Breach Information Security Magazine 1 month 1 week ago Workday has revealed a breach of its third-party CRM systems in what could be the latest ShinyHunters attack
US and Five Global Partners Release First Unified OT Security Taxonomy Information Security Magazine 1 month 2 weeks ago Germany, the Netherlands and four of the Five Eyes countries share a common asset inventory for industrial cybersecurity
Cisco Discloses Critical RCE Flaw in Firewall Management Software Information Security Magazine 1 month 2 weeks ago Cisco has issued a software update to address the vulnerability, which can allow an unauthenticated, remote attacker to inject arbitrary shell commands