Oddbean new post about | logout

Notes by darkreading (RSS Feed) | export

 Nigeria & Romania Ranked Among Top Cybercrime Havens

A survey of cybercrime experts assessing the top cybercrime-producing nations results in some expected leaders — Russia, Ukraine, and China — but also some surprises.

https://www.darkreading.com/cybersecurity-analytics/nigeria-romania-ranked-among-top-cybercrime-havens 
 Why a Native-First Approach Is Key to Cloud Security

A native-first approach delivers better protections and a more efficient use of resources than best-of-breed solutions, benefiting cloud service providers and end-user customers alike.

https://www.darkreading.com/cloud-security/why-a-native-first-approach-is-key-to-cloud-security 
 Global Cybercriminal Duo Face Imprisonment After Hive RAT Scheme

The two allegedly sold the Trojan on Hack Forums, allowing other threat actors to gain unauthorized control, disable programs, browse files, record keystrokes, and steal credentials.

https://www.darkreading.com/cybersecurity-operations/global-cybercriminal-duo-face-imprisonment-after-hive-rat-scheme 
 Name That Toon: Last Line of Defense

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

https://www.darkreading.com/ics-ot-security/name-that-toon-last-line-of-defense 
 LockBit 3.0 Variant Generates Custom, Self-Propagating Malware

Kaspersky researchers discovered the new variant after responding to a critical incident targeting an organization in West Africa.

https://www.darkreading.com/endpoint-security/lockbit-3-0-variant-generates-custom-self-propagating-malware 
 Cisco Duo's Multifactor Authentication Service Breached

A third-party telephony service provider for Cisco Duo falls prey to social engineering, and the company advises customer vigilance against subsequent phishing attacks.

https://www.darkreading.com/cyberattacks-data-breaches/cisco-duo-multifactor-authentication-service-breached 
 Iran-Backed Hackers Blast Out Threatening Texts to Israelis

Handala threat group claims to have hacked radar systems in Israel as tensions rise between the two nations.

https://www.darkreading.com/endpoint-security/iran-backed-hackers-blast-out-threatening-texts-to-israelis 
 Web3 Game Developers Targeted in Crypto Theft Scheme

A Russian-language cyberattack campaign impersonates legitimate game operations to spread various cross-platform infostealers.

https://www.darkreading.com/cyberattacks-data-breaches/russian-actor-targets-web3-game-developers-with-infostealers 
 Critical Infrastructure Security: Observations From the Front Lines

Attacks on critical infrastructure are ramping up — but organizations now have the knowledge and tools needed to defend against them.

https://www.darkreading.com/vulnerabilities-threats/critical-infrastructure-security-observations-from-front-lines 
 Sisense Password Breach Triggers 'Ominous' CISA Warning

With stores of mega-corporate business intelligence, a Sisense compromise could potentially mushroom into supply chain cyberattack disaster, experts fear.

https://www.darkreading.com/threat-intelligence/sisense-breach-triggers-cisa-password-reset-advisory 
 Critical Rust Flaw Poses Exploit Threat in Specific Windows Use Cases

Project behind the Rust programming language asserted that any calls to a specific API would be made safe, even with unsafe inputs, but researchers found ways to circumvent the protections.

https://www.darkreading.com/application-security/critical-rust-flaw-poses-exploit-threat-in-specific-windows-use-cases 
 DPRK Exploits 2 New MITRE Techniques: Phantom DLL Hijacking, TCC Abuse

North Korean hackers break ground with new exploitation techniques for Windows and macOS.

https://www.darkreading.com/vulnerabilities-threats/dprk-exploits-new-mitre-techniques-phantom-dll-hijacking-tcc-abuse 
 Why MLBOMs Are Useful for Securing the AI/ML Supply Chain

A machine learning bill of materials (MLBOM) framework can bring transparency, auditability, control, and forensic insight into AI and ML supply chains.

https://www.darkreading.com/vulnerabilities-threats/mlboms-are-useful-for-securing-ai-ml-supply-chain 
 Zambia Busts 77 People in China-Backed Cybercrime Operation

Phony call center company conducted online fraud and other Internet scams.

https://www.darkreading.com/endpoint-security/zambia-busts-77-in-china-backed-cybercrime-operation 
 Japan, Philippines, & US Forge Cyber Threat Intel-Sharing Alliance

Following the Volt Typhoon attacks on critical infrastructure in the region by China, the US reportedly will share cybersecurity threat information with both countries.

https://www.darkreading.com/cybersecurity-operations/japan-philippines-us-forge-cyber-threat-intelligence-sharing-alliance 
 XZ Utils Scare Exposes Hard Truths About Software Security

Much of the open source code embedded in enterprise software stacks comes from small, under-resourced, volunteer-run projects.

https://www.darkreading.com/application-security/xz-utils-scare-exposes-hard-truths-in-software-security 
 Selecting the Right Authentication Protocol for Your Business

Prioritizing security and user experience will help you build a robust and reliable authentication system for your business.

https://www.darkreading.com/cloud-security/selecting-the-right-authentication-protocol-for-your-business 
 Medusa Gang Strikes Again, Hits Nearly 300 Fort Worth Property Owners

Though a municipal agency assures the public that few are affected, hundreds have their data held ransom for $100,000 by the ransomware gang.

https://www.darkreading.com/cyberattacks-data-breaches/nearly-300-fort-worth-individuals-exploited-by-medusa-cybergang 
 Cagey Phishing Campaign Delivers Multiple RATs to Steal Windows Data

Various anti-detection features, including the use of the ScrubCrypt antivirus-evasion tool, fuel an attack that aims to take over Microsoft Windows machines.

https://www.darkreading.com/remote-workforce/cagey-phishing-attack-delivers-multiple-rats-to-steal-windows-data 
 New Jamf Tools Give Enterprise IT Security and Compliance Controls

The device management company introduced a Fleet Hardening Score and Privilege Escalation (the good kind) to its endpoint security platform for Apple devices.

https://www.darkreading.com/endpoint-security/new-jamf-tools-give-enterprise-it-security-and-compliance-controls 
 LG Smart TVs at Risk of Attacks, Thanks to 4 OS Vulnerabilities

Scans showed that 91,000 devices are exposed and at risk for unauthorized access and TV set takeover.

https://www.darkreading.com/vulnerabilities-threats/researchers-discover-thousands-of-lg-smart-tvs-at-risk-of-attacks 
 EV Charging Stations Still Riddled With Cybersecurity Vulnerabilities

As more electric vehicles are sold, the risk to compromised charging stations looms large alongside the potential for major cybersecurity exploits.

https://www.darkreading.com/ics-ot-security/ev-charging-stations-still-riddled-with-cybersecurity-vulnerabilities 
 Proper DDoS Protection Requires Both Detective and Preventive Controls

DDoS attacks still plague the enterprise, but adding preventive measures can reduce their impact.

https://www.darkreading.com/cloud-security/proper-ddos-protection-requires-both-detective-and-preventive-controls 
 Why Liquid Cooling Systems Threaten Data Center Security & Our Water Supply

We are potentially encroaching on a water supply crisis if data center operators, utilities, and the government don't implement preventative measures now.

https://www.darkreading.com/cybersecurity-operations/why-liquid-cooling-systems-threaten-data-center-security-water-supply 
 92K D-Link NAS Devices Open to Critical Command-Injection Bug

The company is asking users to retire several network-attached storage (NAS) models to avoid compromise through a publicly available exploit that results in backdooring.

https://www.darkreading.com/cloud-security/92k-dlink-nas-critical-command-injection-bug 
 Frameworks, Guidelines & Bounties Alone Won't Defeat Ransomware

We need more than "do-it-yourself" approaches to threats that clearly rise to the level of national security issues.

https://www.darkreading.com/vulnerabilities-threats/frameworks-guidelines-bounties-alone-wont-defeat-ransomware 
 Vietnamese Cybercrime Group CoralRaider Nets Financial Data

With a complex attack chain and using Telegram for its command and control, CoralRaider targets victims in Asian countries — and appears to have accidentally infected itself as well.

https://www.darkreading.com/vulnerabilities-threats/vietnamese-cybercrime-group-coralraider-nets-financial-data 
 Home Depot Hammered by Supply Chain Data Breach

SaaS vendor to blame for exposing employee data that was ultimately leaked on Dark Web forum, according to the home improvement retailer.

https://www.darkreading.com/cyberattacks-data-breaches/home-depot-hammered-by-supply-chain-data-breach 
 Solar Spider Spins Up New Malware to Entrap Saudi Arabian Financial Firms

An ongoing cyberattack campaign with apparent ties to China uses a new version of sophisticated JavaScript remote access Trojan JSOutProx and is now targeting banks in the Middle East.

https://www.darkreading.com/threat-intelligence/solar-spider-spins-up-new-malware-to-entrap-saudi-arabian-banks 
 CISO Corner: Ivanti's Mea Culpa; World Cup Hack; CISOs & Cyber Awareness

Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included: Dealing with a Ramadan cyber spike; funding Internet security; and Microsoft's Azure AI changes.

https://www.darkreading.com/remote-workforce/ciso-corner-ivanti-mea-culpa-world-cup-hack-cyber-awareness 
 Magecart Attackers Pioneer Persistent E-Commerce Backdoor

The infamous payment-skimmer cybercrime organization is exploiting CVE-2024-20720 in Magento for a novel approach to stealing card data.

https://www.darkreading.com/cloud-security/magecart-attackers-pioneer-persistent-ecommerce-backdoor 
 White House's Call for Memory Safety Brings Challenges, Changes & Costs

Improving security in the applications that drive the digital economy is a necessary undertaking, requiring ongoing collaboration between the public and private sectors.

https://www.darkreading.com/vulnerabilities-threats/white-house-call-for-memory-safety-brings-challenges-changes-costs 
 Reconsider Your CNAPP Strategy Using These 5 Scenarios

Cloud-native application protection platforms (CNAPPs) sidestep siloed security and embed security into the earliest stages of application development.

https://www.darkreading.com/cloud-security/reconsider-your-cnapp-strategy-using-these-5-scenarios 
 GAO: CISA's OT Teams Inadequately Staffed

The response teams have a staging shortage, leaving them ill-prepared to take on significant threats from different places at once.

https://www.darkreading.com/ics-ot-security/cisa-ot-teams-are-inadequately-staffed-reports-gao 
 Tips on Managing Diverse Security Teams

The better a security team works together, the bigger the direct impact on how well it can protect the organization.

https://www.darkreading.com/cybersecurity-operations/tips-managing-diverse-security-teams 
 FBI, CISA Release IoCs for Phobos Ransomware

Threat actors using the malware have infected systems within government, healthcare, and other critical infrastructure organizations since at least 2019.

https://www.darkreading.com/cyberattacks-data-breaches/fbi-cisa-release-iocs-for-phobos-ransomware 
 The Next Gen of Cybersecurity Could Be Hiding in Big Tech

Public-private partnerships, increasing cybersecurity budgets for public organizations, and retraining existing tech talent to make the jump to cyber will help ease the staffing crunch.

https://www.darkreading.com/cybersecurity-operations/next-gen-of-cybersecurity-could-be-hiding-in-big-tech