Cybersecurity News


How secure is your cloud storage? Mitigating data security risks in the cloud

As cloud systems are increasingly the bedrock on which digital transformation is built, keeping a close eye on how they are secured is an essential cybersecurity best practice

The post How secure is your cloud storage? Mitigating data security risks in the cloud appeared first on WeLiveSecurity

07 April 2022

VMware warns of critical remote code execution bug in Workspace ONE Access

Other severe vulnerabilities have been resolved.
07 April 2022

Zoom awarded $1.8 million in bug bounty rewards over 2021

The program has paid out $2.4 million since its launch.
07 April 2022

Israeli officials are being catfished by AridViper hackers

APT-C-23 is targeting high-ranking individuals in defense, law, and emergency services.
07 April 2022

The Original APT: Advanced Persistent Teenagers

Many organizations are already struggling to combat cybersecurity threats from ransomware purveyors and state-sponsored hacking groups, both of which tend to take days or weeks to pivot from an opportunistic malware infection to a full blown data breach. But few organizations have a playbook for responding to the kinds of virtual "smash and grab" attacks we've seen recently from LAPSUS$, a juvenile data extortion group whose short-lived, low-tech and remarkably effective tactics are putting some of the world's biggest corporations on edge.
06 April 2022

Attackers Spoof WhatsApp Voice-Message Alerts to Steal Info

Attackers Spoof WhatsApp Voice-Message Alerts to Steal Info Threat actors target Office 365 and Google Workspace in a new campaign, which uses a legitimate domain associated with a road-safety center in Moscow to send messages.
06 April 2022

This new malware targets AWS Lambda environments

Denonia malware is abusing servers to run cryptocurrency miners.
06 April 2022

Fake e‑shops on the prowl for banking credentials using Android malware

ESET researchers analyzed three malicious applications targeting customers of eight Malaysian banks

The post Fake e‑shops on the prowl for banking credentials using Android malware appeared first on WeLiveSecurity

06 April 2022

Fake Android shopping apps steal bank account logins, 2FA codes

Customers of Malaysian banks are being turned into cash cows.
06 April 2022

Authorities Fully Behead Hydra Dark Marketplace

Authorities Fully Behead Hydra Dark Marketplace The popular underground market traded in drugs, stolen data, forged documents and more -- raking in billions in Bitcoin.
05 April 2022

FIN7 hackers evolve operations with ransomware, novel backdoor

Researchers have explored the shift in the sophisticated group's latest tactics.
05 April 2022

No-Joke Borat RAT Propagates Ransomware, DDoS

No-Joke Borat RAT Propagates Ransomware, DDoS This fresh malware strain extends the functionality of typical trojans with advanced functionality and a series of modules for launching various types of threat activity.
05 April 2022

GitHub now scans for secret leaks in developer workflows

The new tool aims to protect developers against API and token exposure.
05 April 2022

US judge sentences men for $1.5 million Apple Gift Card scam

Apple is also owed over $1 million in damages.
05 April 2022

We’re going on Tor

If better privacy and anonymity sound like music to your ears, you may not need to look much further than Tor Browser. Here’s what it’s like to surf the dark web using the browser.

The post We’re going on Tor appeared first on WeLiveSecurity

05 April 2022

Borat RAT malware: a 'unique' triple threat that is far from funny

The malware combines remote access, spyware, and ransomware into one nasty package.
04 April 2022

Turkey seeks 40,000-year sentences for alleged cryptocurrency exit scammers

21 suspects are wanted in connection to a defunct Turkish crypto exchange.
04 April 2022

Week in security with Tony Anscombe

Under the hood of Wslink's VM – The energy sector & cyber-risk – SMB cybersecurity survival tips

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity

01 April 2022

Apple Rushes Out Patches for 0-Days in MacOS, iOS

Apple Rushes Out Patches for 0-Days in MacOS, iOS The vulnerabilities could allow threat actors to disrupt or access kernel activity and may be under active exploit.
01 April 2022

Chinese hackers Deep Panda return with Log4Shell exploits, new Fire Chili rootkit

Log4Shell is being exploited to deploy the kernel rootkit.
01 April 2022