Cybersecurity News


Zenly Social-Media App Bugs Allow Account Takeover

Zenly Social-Media App Bugs Allow Account Takeover A pair of bugs in the Snap-owned tracking app reveal phone numbers and allow account hijacking.
24 February 2022

Microsoft App Store Sizzling with New ‘Electron Bot’ Malware

Microsoft App Store Sizzling with New ‘Electron Bot’ Malware The SEO poisoning bot, capable of full system takeover, is actively taking over social media accounts, masquerading as popular games like Temple Run.
24 February 2022

Russia unleashed data-wiper virus on Ukraine, say cyber experts

Russia unleashed data-wiper virus on Ukraine, say cyber experts

UK government and banks on alert for new form of malware said to have infected hundreds of machines

Cyber experts have identified a new strain of computer-disabling malware unleashed on Ukrainian targets as part of Russia’s offensive, as the UK government and banks said they were on alert for online attacks.

Russia was widely expected to launch a cyber assault alongside its military campaign, and the run-up to the invasion of Ukraine was marked by the deployment of a “wiper” virus. A distributed denial-of-service (DDoS) attack, which paralyses websites by bombarding them with spurious information requests, also hit Ukrainian government sites.

Continue reading...
24 February 2022

Web Filtering and Compliances for Wi-Fi Providers

Web Filtering and Compliances for Wi-Fi Providers Demand for public Wi-Fi is on the rise. Usually free of charge, but there is a risk of expensive losses. Learn ways to protect yourself from cyber-threats.
24 February 2022

Cyberattackers Leverage DocuSign to Steal Microsoft Outlook Logins

Cyberattackers Leverage DocuSign to Steal Microsoft Outlook Logins A targeted phishing attack takes aim at a major U.S. payments company.
24 February 2022

The Art of Non-boring Cybersec Training–Podcast

The Art of Non-boring Cybersec Training–Podcast With human error being the common factor in most cyberattacks, employee training has got to get better. To that end, Trustwave cybersec training expert Darren Van Booven explains the importance of fish stress balls and management buy-in.
24 February 2022

Darktrace acquires attack surface analytics firm Cybersprint

Darktrace says the deal will bolster the firm's artificial intelligence (AI) capabilities.
24 February 2022

HermeticWiper: New data‑wiping malware hits Ukraine

Hundreds of computers in Ukraine compromised just hours after a wave of DDoS attacks brings down a number of Ukrainian websites

The post HermeticWiper: New data‑wiping malware hits Ukraine appeared first on WeLiveSecurity

24 February 2022

Samsung Shattered Encryption on 100M Phones

Samsung Shattered Encryption on 100M Phones One cryptography expert said that 'serious flaws' in the way Samsung phones encrypt sensitive material, as revealed by academics, are 'embarrassingly bad.'
23 February 2022

Sextortion Rears Its Ugly Head Again

Sextortion Rears Its Ugly Head Again Attackers are sending email blasts with malware links in embedded PDFs as a way to evade email filters, lying about having fictional "video evidence."
23 February 2022

Coffee with the Council Podcast: What’s New in 2022 Featuring Lance Johnson

 

Alicia Malone: Welcome to the first episode of our new podcast series, “Coffee with The Council”. I'm Alicia Malone, senior manager of public relations for the PCI Security Standards Council. Today, we'll be talking about what you can expect in the year ahead for PCI SSC with Lance Johnson, our executive director. Welcome, Lance.

23 February 2022

Creaky Old WannaCry, GandCrab Top the Ransomware Scene

Creaky Old WannaCry, GandCrab Top the Ransomware Scene Nothing like zombie campaigns: WannaCry's old as dirt, and GandCrab threw in the towel years ago. They're on auto-pilot at this point, researchers say.
23 February 2022

Technology, Progress, and Climate

The climate solutions we need to transform every sector are here. The question is: what role will you play in this transformation? You, your community, your business, your government?

The post Technology, Progress, and Climate appeared first on WeLiveSecurity

23 February 2022

Malware authors target rivals with malicious npm packages

Trojan packages reveal what could be internal rivalry between cybercriminals.
23 February 2022

These new hacking groups are striking industrial, operational tech targets

Two of the new groups are sophisticated enough to reach ICS/OT networks directly.
23 February 2022

Hackers tried to shatter the spine of global supply chains in 2021

IBM researchers say supply chains were the focus of criminals last year and manufacturers bore the brunt of attacks.
23 February 2022

Gaming, Banking Trojans Dominate Mobile Malware Scene

Gaming, Banking Trojans Dominate Mobile Malware Scene The overall number of attacks on mobile users is down, but they're getting slicker, both in terms of malware functionality and vectors, researchers say.
22 February 2022

Cyberattackers Cook Up Employee Personal Data Heist for Meyer

Cyberattackers Cook Up Employee Personal Data Heist for Meyer The Conti gang breached the cookware giant's network, prepping thousands of employees’ personal data for consumption by cybercrooks.
22 February 2022

Police use of Pegasus malware not illegal, Israeli inquiry finds

Police use of Pegasus malware not illegal, Israeli inquiry finds

Police have been accused of spying on at least 26 individuals who are not criminal suspects

An inquiry into allegations that Israel’s police force systematically hacked into the mobile phones of Israeli citizens has found that while the police did use NSO Group’s controversial Pegasus malware, there is no evidence suggesting illegality.

In a series of explosive reports over the last two months, the local financial daily newspaper Calcalist accused the police of spying on at least 26 individuals who were not criminal suspects. Those named included politicians, protesters, and members of the former prime minister Benjamin Netanyahu’s inner circle – claims Netanyahu used to delay proceedings in his corruption trial.

Continue reading...
22 February 2022

Xenomorph Malware Burrows into Google Play Users, No Facehugger Required

Xenomorph Malware Burrows into Google Play Users, No Facehugger Required Researchers discovered a new, modular banking trojan with ties to Cerberus and Alien that has the capability to become a much larger threat than it is now.
22 February 2022