Cybersecurity News
We COVID-Clicked on Garbage, Report Finds: Podcast

Iranian APT Lures Defense Contractor in Catfishing-Malware Scam

Ransomware Volumes Hit Record Highs as 2021 Wears On

Back-to-Basics: Keep Software Patched
As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses. In this 8-part back-to-basics series, we highlight payment security basics for protecting against payment data theft. Today’s blog focuses on keeping software patched.
Raccoon Stealer Bundles Malware, Propagates Via Google SEO

‘DeadRinger’ Targeted Exchange Servers Long Before Discovery

Raccoon stealer-as-a-service will now try to grab your cryptocurrency
The malware has been upgraded to target even more financial information.DeadRinger: Chinese APTs strike major telecommunications companies
Previously unknown campaigns center around "Chinese state interests."‘PwnedPiper’: Devastating Bugs in >80% of Hospital Pneumatics

Part One: Conceptual Differences Between SSF and PA-DSS
To assist stakeholders in their migration from PA-DSS to the Software Security Framework, PCI Security Standards Council (PCI SSC) is publishing a series of blog posts to guide payment software vendors and assessors through the key differences between PA-DSS and the SSF. In Part One of our multi-part blog series, PCI SSC’s Sr. Manager, Public Relations Alicia Malone sits down with PCI SSC’s Sr. Manager, Emerging Standards Jake Marcinko to discuss some of the conceptual differences between PA-DSS and the Software Security Framework that stakeholders should be aware of as they work to transition between programs.
Chipotle Emails Serve Up Phishing Lures

New Normal Demands New Security Leadership Structure
At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security strategy and how organizations can fill them.Multiple Zero-Day Flaws Discovered in Popular Hospital Pneumatic Tube System
"PwnedPiper" flaws could allow attackers to disrupt delivery of lab samples or steal hospital employee credentials, new research shows.Ransomware operators love them: Key trends in the Initial Access Broker space
In a threat actor's mind, take out the legwork, reap the proceeds of blackmail.On course for a good hacking
A story of how easily hackers could hit a hole-in-one with the computer network of a premier golf club in the UK.
The post On course for a good hacking appeared first on WeLiveSecurity
NSA Warns Public Networks are Hacker Hotbeds

Transition to Version 1.1 for New Secure SLC and Secure Software Submissions
With the release of the Secure Software Lifecycle (“Secure SLC”) Standard v1.1 in February 2021 and the Secure Software Standard v1.1 in April 2021, updated versions of the associated reporting templates and attestation forms were also made available in the Document Library.
Novel Meteor Wiper Used in Attack that Crippled Iranian Train System

Week in security with Tony Anscombe
With vacations in full swing, cybercriminals will be looking to scam vacationers looking for that perfect accommodation. Learn to identify these scams. Most people are fans of the convenience provided by online shopping, but some criminals uses this to lure clients into Amazon scams. Learn to detect these. Now that organizations are set to evolve a
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Watch out for these scams, targeting Amazon’s customers
Most people are fans of the convenience Amazon brings to online shopping, and that’s precisely what cybercriminals are betting on.
The post Watch out for these scams, targeting Amazon’s customers appeared first on WeLiveSecurity