Cybersecurity News
Potential Nation-State Actor Targets COVID-19 Vaccine Supply Chain
Companies involved in technologies for keeping vaccines cold enough for safe storage and transportation are being targeted in a sophisticated spear-phishing campaign, IBM says.03 December 2020
TrickBot's New Tactic Threatens Firmware
A newly discovered module checks machines for flaws in the UEFI/BIOS firmware so malware can evade detection and persist on a device.03 December 2020
Researchers Discover New Obfuscation-As-a-Service Platform
Researchers detail how a Android APK obfuscation service automates detection evasion for highly malicious apps.03 December 2020
Kmart, Latest Victim of Egregor Ransomware – Report

03 December 2020
Common Container Manager Is Vulnerable to Dangerous Exploit
Container manager vulnerability is one of several weaknesses and vulnerabilities recently disclosed for Docker.03 December 2020
Cloud Security Threats for 2021
Most of these issues can be remediated, but many users and administrators don't find out about them until it's too late.03 December 2020
TrickBot Returns with a Vengeance, Sporting Rare Bootkit Functions

03 December 2020
Dell announces new protections for its PC and server supply chain
Dell to start using tamper-evident seals during physical transport and provide a software reset feature to wipe hard-drives before customer deployment.03 December 2020
US Officials Take Action Against 2,300 Money Mules
Eight federal law enforcement agencies participated in the Money Mule Initiative, a global crackdown on money laundering.03 December 2020
iPhone hack allowed device takeover via Wi‑Fi
Using a zero-click exploit, an attacker could have taken complete control of any iPhone within Wi-Fi range in seconds
The post iPhone hack allowed device takeover via Wi‑Fi appeared first on WeLiveSecurity
03 December 2020
Researchers Bypass Next-Generation Endpoint Protection
Machine learning-based products can be tricked to classify malware as a legitimate file, new findings show.03 December 2020
DeathStalker APT Spices Things Up with PowerPepper Malware

03 December 2020
Reverse Engineering Tools: Evaluating the True Cost

03 December 2020
Cyberattacks Target COVID-19 Vaccine ‘Cold-Chain’ Orgs

03 December 2020
As Modern Mobile Enables Remote Work, It Also Demands Security

03 December 2020
From FUD to Fix: Why the CISO-Vendor Partnership Needs to Change Now
CISOs and their staffs are up against too many systems, screens, and alerts, with too few solutions to effectively address pain points.03 December 2020
Clop Gang Makes Off with 2M Credit Cards from E-Land

03 December 2020
Data of 243 million Brazilians exposed online via website source code
The password to access a highly sensitive Ministry of Health database was stored inside a government site's source code.03 December 2020
Code42 Incydr Series: Honing in on High-Risk Users with Code42 Incydr

03 December 2020
Google Security Researcher Develops 'Zero-Click' Exploit for iOS Flaw
A new patched memory corruption vulnerability in Apple's AWDL protocol can be used to take over iOS devices that are in close proximity to an attacker.03 December 2020