Cybersecurity News


DeadRinger: Chinese APTs strike major telecommunications companies

Previously unknown campaigns center around "Chinese state interests."
03 August 2021

‘PwnedPiper’: Devastating Bugs in >80% of Hospital Pneumatics

‘PwnedPiper’: Devastating Bugs in >80% of Hospital Pneumatics Podcast: Blood samples aren’t martinis. You can’t shake them. But bugs in pneumatic control systems could lead to that, RCE or ransomware.
02 August 2021

Part One: Conceptual Differences Between SSF and PA-DSS


To assist stakeholders in their migration from PA-DSS to the Software Security Framework, PCI Security Standards Council (PCI SSC) is publishing a series of blog posts to guide payment software vendors and assessors through the key differences between PA-DSS and the SSF. In Part One of our multi-part blog series, PCI SSC’s Sr. Manager, Public Relations Alicia Malone sits down with PCI SSC’s Sr. Manager, Emerging Standards Jake Marcinko to discuss some of the conceptual differences between PA-DSS and the Software Security Framework that stakeholders should be aware of as they work to transition between programs.

02 August 2021

Chipotle Emails Serve Up Phishing Lures

Chipotle Emails Serve Up Phishing Lures Mass email distribution service compromise mirrors earlier Nobelium attacks.
02 August 2021

New Normal Demands New Security Leadership Structure

At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security strategy and how organizations can fill them.
02 August 2021

Multiple Zero-Day Flaws Discovered in Popular Hospital Pneumatic Tube System

"PwnedPiper" flaws could allow attackers to disrupt delivery of lab samples or steal hospital employee credentials, new research shows.
02 August 2021

Ransomware operators love them: Key trends in the Initial Access Broker space

In a threat actor's mind, take out the legwork, reap the proceeds of blackmail.
02 August 2021

On course for a good hacking

A story of how easily hackers could hit a hole-in-one with the computer network of a premier golf club in the UK.

The post On course for a good hacking appeared first on WeLiveSecurity

02 August 2021

NSA Warns Public Networks are Hacker Hotbeds

NSA Warns Public Networks are Hacker Hotbeds Agency warns attackers targeting teleworkers to steal corporate data.
30 July 2021

Transition to Version 1.1 for New Secure SLC and Secure Software Submissions


With the release of the Secure Software Lifecycle (“Secure SLC”) Standard v1.1 in February 2021 and the Secure Software Standard v1.1 in April 2021, updated versions of the associated reporting templates and attestation forms were also made available in the Document Library.

30 July 2021

Novel Meteor Wiper Used in Attack that Crippled Iranian Train System

Novel Meteor Wiper Used in Attack that Crippled Iranian Train System A July 9th attack disrupted service and taunted Iran’s leadership with hacked screens directing customers to call the phone of Iranian Supreme Leader Khamenei with complaints.
30 July 2021

Week in security with Tony Anscombe

With vacations in full swing, cybercriminals will be looking to scam vacationers looking for that perfect accommodation. Learn to identify these scams. Most people are fans of the convenience provided by online shopping, but some criminals uses this to lure clients into Amazon scams. Learn to detect these. Now that organizations are set to evolve a

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity

30 July 2021

Watch out for these scams, targeting Amazon’s customers

Most people are fans of the convenience Amazon brings to online shopping, and that’s precisely what cybercriminals are betting on.

The post Watch out for these scams, targeting Amazon’s customers appeared first on WeLiveSecurity

30 July 2021

UC San Diego Health Breach Tied to Phishing Attack

UC San Diego Health Breach Tied to Phishing Attack Employee email takeover exposed personal, medical data of students, employees and patients.
29 July 2021

CISA’s Top 30 Bugs: One’s Old Enough to Buy Beer

CISA’s Top 30 Bugs: One’s Old Enough to Buy Beer There are patches or remediations for all of them, but they're still being picked apart. Why should attackers stop if the flaws remain unpatched, as so many do?
29 July 2021

Leading cybersecurity agencies reveal list of most exploited vulnerabilities of the past 2 years

There are 30 vulnerabilities listed in total; organizations would do well to patch their systems if they haven’t done so yet

The post Leading cybersecurity agencies reveal list of most exploited vulnerabilities of the past 2 years appeared first on WeLiveSecurity

29 July 2021

Israeli Government Agencies Visit NSO Group Offices

Israeli Government Agencies Visit NSO Group Offices Authorities opened an investigation into the secretive Israeli security firm.
29 July 2021

The Life Cycle of a Breached Database

Every time there is another data breach, we are asked to change our password at the breached entity. But the reality is that in most cases by the time the victim organization discloses an incident publicly the information has already been harvested many times over by profit-seeking cybercriminals. Here's a closer look at what typically transpires in the weeks or months before an organization notifies its users about a breached database. Our continued reliance on passwords for authentication has contributed to one toxic data spill or hack after another. One might even say passwords are the fossil fuels powering most IT modernization: They're ubiquitous because they are cheap and easy to use, but that means they also come with significant trade-offs -- such as polluting the Internet with weaponized data when they're leaked or stolen en masse.
29 July 2021

Six Malicious Linux Shell Scripts Used to Evade Defenses and How to Stop Them

Six Malicious Linux Shell Scripts Used to Evade Defenses and How to Stop Them Uptycs Threat Research outline how malicious Linux shell scripts are used to cloak attacks and how defenders can detect and mitigate against them.
29 July 2021

Tackling the insider threat to the new hybrid workplace

Now that organizations are set to evolve a hybrid blend of home and office-based work for most employees, it is more important then ever to address the risks that insider threat can - willingly or unwitingly - pose.

The post Tackling the insider threat to the new hybrid workplace appeared first on WeLiveSecurity

29 July 2021