Kaiser Permanente Exposes Nearly 70K Medical Records in Data BreachAttackers gained access to private account details through an email compromise incident that occurred in April.
Linux Malware Deemed ‘Nearly Impossible’ to DetectSymbiote, discovered in November, parasitically infects running processes so it can steal credentials, gain rootlkit functionality and install a backdoor for remote access.
“Downthem” DDoS-for-Hire Boss Gets 2 Years in PrisonA 33-year-old Illinois man was sentenced to two years in prison today following his conviction last year for operating services that allowed paying customers to launch powerful distributed denial-of-service (DDoS) attacks against hundreds of thousands of Internet users and websites.
Request for Comments: New Mobile Payments on COTS (MPoC) Standard
From 13 June to 15 July 2022, Participating Organizations, PCI-recognized Laboratories, PCI-recognized Assessors, and Approved Scanning Vendors are invited to review and provide feedback on the new Mobile Payments on COTS (MPoC) Standard during a 30-day request for comments (RFC) period.
Bluetooth Signals Can Be Used to Track Smartphones, Say ResearchersResearchers demonstrated a possible way to track individuals via Bluetooth signals.
Industroyer: A cyber‑weapon that brought down a power grid
Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids
The post Industroyer: A cyber‑weapon that brought down a power grid appeared first on WeLiveSecurity
Adconion Execs Plead Guilty in Federal Anti-Spam CaseOn the eve of their federal criminal trial for allegedly stealing vast swaths of Internet addresses for use in large-scale email spam campaigns, three current or former executives at online advertising firm Adconion Direct have agreed to plead guilty to lesser misdemeanor charges of fraud and misrepresentation via email.
3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe
Here are three themes that stood out at the world's largest gathering of cybersecurity professionals
The post 3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe appeared first on WeLiveSecurity
RSA – APIs, your organization’s dedicated backdoors
API-based data transfer is so rapid, there’s but little time to stop very bad things happening quickly
The post RSA – APIs, your organization’s dedicated backdoors appeared first on WeLiveSecurity
U.S. Water Utilities Prime Cyberattack Target, ExpertsEnvironmentalists and policymakers warn water treatment plants are ripe for attack.
Potent Emotet Variant Spreads Via Stolen Email CredentialsThe dangerous malware appears to be well and truly back in action, sporting new variants and security-dodging behaviors in a wave of recent phishing campaigns.
Why you can't trust InstagramWeeks after I reported that my Instagram account had been hacked, Instagram remained silent. My account is now long gone.
Feds Forced Travel Firms to Share Surveillance Data on HackerSabre and Travelport had to report the weekly activities of former “Cardplanet” cybercriminal Aleksei Burkov for two years, info that eventually led to his arrest and prosecution.
RSA – Creepy real‑world edition
Digital fiddling somehow got mixed up in a real war
The post RSA – Creepy real‑world edition appeared first on WeLiveSecurity
This new Linux malware is 'almost impossible' to detectSymbiote is parasitic malware that provides rootkit-level functionality.
RSA – Digital healthcare meets security, but does it really want to?
Technology is understandably viewed as a nuisance to be managed in pursuit of the health organizations’ primary mission
The post RSA – Digital healthcare meets security, but does it really want to? appeared first on WeLiveSecurity
Taming the Digital Asset TsunamiRob Gurzeev, CEO and Co-Founder of CyCognito, explores external attack surface soft spots tied to an ever-expanding number of digital assets companies too often struggle to keep track of and manage effectively.
Paying Ransomware Paints Bigger Bullseye on Target’s BackRansomware attackers often strike targets twice, regardless of whether the ransom was paid.
Black Basta Ransomware Teams Up with Malware Stalwart QbotThe novel cybercriminal group tapped the ever-evolving info-stealing trojan to move laterally on a network in a recent attack, researchers have found.
RSA – Spot the real fake
How erring on the side of privacy might ultimately save you from chasing down a virtual rendition of you doing the bidding of a scammer
The post RSA – Spot the real fake appeared first on WeLiveSecurity