Cybersecurity News
UK Cops Collar 7 Suspected Lapsus$ Gang Members

Microsoft Azure Developers Awash in PII-Stealing npm Packages

Just-Released Dark Souls Game, Elden Ring, Includes Killer Bug

PCI DSS v4.0: A Preview of the Standard and Transition Training
Alicia Malone: Welcome to our podcast series, Coffee with the Council. I'm Alicia Malone, senior manager of public relations for the PCI Security Standards Council. Today we'll be talking about the much-anticipated release of version 4.0 of our PCI Data Security Standard, or DSS. In addition to the timeline and some key highlights, we'll be discussing what you need to know to prepare for PCI DSS version 4.0 transition training. My guests for this episode are Kandyce Young, standards development manager at PCI SSC, and Tom White, training content manager at PCI SSC. Welcome to both of you!
HubSpot Data Breach Ripples Through Crytocurrency Industry

Is a nation‑state digital deterrent scenario so far‑fetched?
Why has the conflict in Ukraine not caused the much anticipated global cyber-meltdown?
The post Is a nation‑state digital deterrent scenario so far‑fetched? appeared first on WeLiveSecurity
Chinese APT Combines Fresh Hodur RAT with Complex Anti-Detection

Microsoft Help Files Disguise Vidar Malware

Top 3 Attack Trends in API Security – Podcast

Tax-Season Scammers Spoof Fintechs, Including Stash, Public

Vidar spyware is now hidden in Microsoft help files
The malware is being spread through an interesting phishing tactic.Crypto malware in patched wallets targeting Android and iOS devices
ESET Research uncovers a sophisticated scheme that distributes trojanized Android and iOS apps posing as popular cryptocurrency wallets
The post Crypto malware in patched wallets targeting Android and iOS devices appeared first on WeLiveSecurity
Mustang Panda hacking group takes advantage of Ukraine crisis in new attacks
Just as criminals seized on the pandemic, this group is trying to capitalize on Russia's invasion of Ukraine.Malicious npm packages target Azure developers to steal personal data
Typosquatting and automatic tools are the weapons of choice.A Closer Look at the LAPSUS$ Data Extortion Group
Microsoft and identity management platform Okta both disclosed this week breaches involving LAPSUS$, a relatively new cybercrime group that specializes in stealing data from big companies and threatening to publish the information unless a ransom demand is paid. Here's a closer look at LAPSUS$, and some of the low-tech but high-impact methods the group uses to gain access to targeted organizations.Okta names Sitel in Lapsus$ security incident impacting up to 366 customers
The analogy "walking away from your computer at a coffee shop" has been used to describe the incident.DeadBolt Ransomware Resurfaces to Hit QNAP Again

Microsoft: Lapsus$ Used Employee Account to Steal Source Code

This is how much the average Conti hacking group member earns a month
While ransom payments can reach millions of dollars, it isn't as much as you'd think.Mustang Panda’s Hodur: Old tricks, new Korplug variant
ESET researchers have discovered Hodur, a previously undocumented Korplug variant spread by Mustang Panda, that uses phishing lures referencing current events in Europe, including the invasion of Ukraine
The post Mustang Panda’s Hodur: Old tricks, new Korplug variant appeared first on WeLiveSecurity