Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Pakistani Military T ...

 Security

Trend Micro spotted recent malicious activity conducted by cybercriminal group Confucius. The hackers launched a spear-phishing campaign using Pegasus lures to trick users into clicking on a malicious document that downloads a data theft code.   The attack begins with a clean email that contains a text copied from a   show more ...

legitimate Pakistani newspaper article.Two days later, the victim receives a new email with a warning from a Pakistani military official about the Pegasus spyware that includes a cutt.ly link to encrypted Word document and a decryption password. Regardless of the action taken by the victim, clicking on either of the links leads to downloading the Word document. If the target makes the mistake of entering... (read more)

image for More Than 600 ICS Fl ...

 Security

In the first six months of this year, 600 vulnerabilities were discovered in ICS products (Industrial Control Systems), impacting 76 vendors. The number of vulnerabilities increased by 41% in the same period, according to Claroty's ICS Risk & Vulnerability Report: H1 2021.  As the need to connect devices to the   show more ...

internet increases, so does the risk of being attacked by cybercriminals. Companies need to drive their business and invest in Operational Technology (OT) devices, and threat actors are using this growth to their advantage, seeking to launch hacking campaigns by taking advantage of companies that have vulnerable IT systems.  Advantech (22), WAGO (23), Rockwell Automation (35), Schneider Electric (65) and Siemens (146 vulnerabilities) are the most affected manufacturers. An important aspect is that the list of affected manufacturers also includes 20 companies whose product... (read more)

image for Hackers Steal More T ...

 Security

In recent months, more crypto exchange platforms have been targeted by hackers. The most recent attack resulted in the theft of $97 million worth of digital assets from the Japanese cryptocurrency exchange Liquid, according to ZDNet.  Liquid did not provide an estimate of damages because it is subject to analyses of   show more ...

the Financial Services Agency from Japan. Nevertheless, the attack affected many users, as Liquid is among the top 20 crypto exchanges in the world in terms of daily trading volume, sums estimated at more than $133 million per day on CoinMarketCap. On the other hand. blockchain analytics firm Elliptic, claimed hackers obtained more than $97 million in cryptoc... (read more)

image for Episode 223: CISA Lo ...

 Business

In this week’s episode of the podcast (#223), we are joined by Josh Corman and Lisa Young of the COVID task force at CISA to talk about the agency’s work to improve the security of critical sectors of the U.S. economy. Job #1: erase the so-called security “poverty line” that keeps small, poorly resourced firms   show more ...

from obtaining the skills and...Read the whole entry... » Related StoriesEncore Podcast: Is Autonomous Driving Heading for a Crash?Episode 216: Signed, Sealed and Delivered: The Future of Supply Chain SecurityEpisode 222: US Rep. Himes on Congress’s About-face on Cybersecurity

 Breaches and Incidents

The stolen data reportedly includes 969 databases from ACSystem, NewOrangeTee, OT_Analytics, OT_Leave, and ProjInfoListing, ranging from corporate/financial records to customer private personal and financial information.

 Malware and Vulnerabilities

The security experts of the cybersecurity firm, Volexity have recently reported an attack through which the North Korean Hacker Group using browser exploits to deploy the customer malware on the website.

 Identity Theft, Fraud, Scams

In research presented at the Defcon security conference this month, a researcher found workarounds that attackers could potentially use to get past Google's enhanced Workspace protections.

 Malware and Vulnerabilities

Emsisoft has released a decryptor for the SynAck Ransomware, allowing victims to decrypt their encrypted files for free. As part of this rebranding, the threat actors released the master decryption keys on their Tor data leak site.

 Innovation and Research

Researchers discovered a new adversarial attack, OPAD, that can gull AI technologies to modify the appearance of real 3D objects. One of the critical factors of such an attack is that no physical access is required for the objects. The successful demonstration of OPAD shows the possibility of using an optical system to modify faces or surveillance tasks.

 Data loss

T-Mobile has confirmed media reports from earlier this week that it had suffered a serious data breach. And it's not just existing T-Mobile users who should be alarmed, but former and prosepective customers as well.

2021-08
Aggregator history
Saturday, August 21
SUN
MON
TUE
WED
THU
FRI
SAT
AugustSeptemberOctober