Cybersecurity News


Researchers: Booming Cyber-Underground Market for Initial-Access Brokers

Researchers: Booming Cyber-Underground Market for Initial-Access Brokers Ransomware gangs are increasingly buying their way into corporate networks, purchasing access from 'vendors' that have previously installed backdoors on targets.
16 June 2021

Peloton Bike+ Bug Gives Hackers Complete Control

Peloton Bike+ Bug Gives Hackers Complete Control An attacker with initial physical access (say, at a gym) could gain root entry to the interactive tablet, making for a bevy of remote attack scenarios.
16 June 2021

OSINT 101: What is open source intelligence and how is it used?

OSINT can be used by anyone, both for good and bad ends – here’s how defenders can use it to keep ahead of attackers

The post OSINT 101: What is open source intelligence and how is it used? appeared first on WeLiveSecurity

16 June 2021

Facebook awards $30,000 bounty for exploit exposing private Instagram content

The bug allowed users to view content without following an account.
16 June 2021

SEC settles with First American over massive leak of mortgage data, disclosure

First American has agreed to a penalty of close to half a million dollars.
16 June 2021

Thousands of VMware vCenter Servers Remain Open to Attack Over the Internet

Three weeks after company disclosed two critical vulnerabilities in the workload management utility, many organizations have not patched the technology yet, security vendor says.
15 June 2021

Microsoft Disrupts Large-Scale BEC Campaign Across Web Services

Attackers had used the cloud-based infrastructure to target mailboxes and add forwarding rules to learn about financial transactions.
15 June 2021

Security Experts Scrutinize Apple, Amazon IoT Networks

Both companies have done their due diligence in creating connected-device networks, but the pervasiveness of the devices worries some security researchers.
15 June 2021

Millions of Connected Cameras Open to Eavesdropping

Millions of Connected Cameras Open to Eavesdropping A supply-chain component lays open camera feeds to remote attackers thanks to a critical security vulnerability.
15 June 2021

Andariel Group Targets South Korean Entities in New Campaign

Andariel, designated as a sub-group of the Lazarus Group APT, has historically targeted South Korean organzations.
15 June 2021

Deloitte Buys Terbium Labs to Expand Threat Intel Capabilities

Terbium Labs' products and services will become part of Deloitte's Detect & Respond lineup, the company confirms.
15 June 2021

Malicious PDFs Flood the Web, Lead to Password-Snarfing

Malicious PDFs Flood the Web, Lead to Password-Snarfing SolarMarker makers are using SEO poisoning, stuffing thousands of PDFs with tens of thousands of pages full of SEO keywords & links to redirect to the malware.
15 June 2021

What Industrial Control System Vulnerabilities Can Teach Us About Protecting the Supply Chain

Older technologies used in industrial and critical infrastructure leave the sector highly vulnerable to attack, but organizations can take steps to better protect themselves.
15 June 2021

Microsoft Disrupts Large-Scale, Cloud-Based BEC Campaign

Microsoft Disrupts Large-Scale, Cloud-Based BEC Campaign Varied cloud infrastructure was used to phish email credentials, monitor for and forward finance-related messages and automate operations.
15 June 2021

Microsoft takes down large‑scale BEC operation

The fraudsters ran their campaigns from the cloud and used phishing and email forwarding rules to steal their targets' financial information.

The post Microsoft takes down large‑scale BEC operation appeared first on WeLiveSecurity

15 June 2021

How President Biden Can Better Defend the US From Russian Hacks

How President Biden Can Better Defend the US From Russian Hacks Wilson Center cybersecurity expert Meg King pinpoints five ambitious steps the administration should take, including a comprehensive national data breach notification protocol.
15 June 2021

How Does One Get Hired by a Top Cybercrime Gang?

The U.S. Department of Justice (DOJ) last week announced the arrest of a 55-year-old Latvian woman who’s alleged to have worked as a programmer for Trickbot, a malware-as-a-service platform responsible for infecting millions of computers and seeding many of those systems with ransomware. Just how did a self-employed web site designer and mother of two come to work for one of the world’s most rapacious cybercriminal groups and then leave such an obvious trail of clues indicating her involvement with the gang? This post explores answers to those questions, as well as some of the ways Trickbot and other organized cybercrime gangs gradually recruit, groom and trust new programmers.
15 June 2021

Insider Risks In the Work-From-Home World

Insider Risks In the Work-From-Home World Forcepoint’s Michael Crouse talks about risk-adaptive data-protection approaches and how to develop a behavior-based approach to insider threats and risk, particularly with pandemic-expanded network perimeters.
15 June 2021

SASE & Zero Trust: The Dream Team

SASE & Zero Trust: The Dream Team Forcepoint’s Nico Fischbach, global CTO and VPE of SASE, and Chase Cunningham, chief strategy officer at Ericom Software, on using SASE to make Zero Trust real.
15 June 2021

How Does the Government Buy Its Cybersecurity?

The federal government is emphasizing cybersecurity regulation, education, and defense strategies this year.
15 June 2021