FinSpy surveillance malware is now spreading through UEFI bootkitsThe spyware had previously been associated with malicious installers and MBR bootkits.
Working Exploit Is Out for VMware vCenter CVE-2021-22005 FlawThe unredacted RCE exploit allows unauthenticated, remote attackers to upload files to the vCenter Server analytics service.
SolarWinds Attackers Hit Active Directory Servers with FoggyWeb BackdoorMicrosoft is warning that the Nobelium APT is compromising single-sign-on servers to install a post-exploitation backdoor that steals data and maintains network persistence.
Credential Spear-Phishing Uses Spoofed Zix Encrypted EmailThe spoofed email has targeted close to 75K inboxes, slipping past spam and security controls across Office 365, Google Workspace, Exchange, Cisco ESA and more.
Scalper bots are now targeting graphics card vendorsConcert tickets are no longer the most coveted items on a reseller's list.
5 Steps to Securing Your Network PerimeterEkaterina Kilyusheva, head of the Information Security Analytics Research Group at Positive Technologies, offers a blueprint for locking up the fortress.
Women, Minorities Are Hacked More Than OthersIncome level, education and being part of a disadvantaged population all contribute to cybercrime outcomes, a survey suggests.
EU: Russia Behind ‘Ghostwriter’ Campaign Targeting GermanyIt's not the first time that the disinformation/spearphishing campaign, which originally smeared NATO, has been linked to Russia.
Google releases emergency fix to plug zero‑day hole in Chrome
The emergency release comes a mere three days after Google’s previous update that plugged another 19 security loopholes
The post Google releases emergency fix to plug zero‑day hole in Chrome appeared first on WeLiveSecurity
3.8 Billion Users’ Combined Clubhouse, Facebook Data Up for SaleCombined cache of data likely to fuel rash of account takeover, smishing attacks, experts warn.
Exchange/Outlook Autodiscover Bug Spills $100K+ Email PasswordsHundreds of thousands of email credentials, many of which double as Active Directory domain credentials, came through to credential-trapping domains in clear text.
New Guidelines on Remote Assessments
Today, the Council has published “PCI SSC Remote Assessment Guidelines and Procedures”. These Guidelines define the principles and procedures for the appropriate use of remote assessments for PCI SSC standards when an onsite assessment is not possible. Here we interview Emma Sutcliffe, SVP Standards Officer on how the industry can use these guidelines to support secure remote assessment practices.
TangleBot Malware Reaches Deep into Android Device FunctionsThe mobile baddie grants itself access to almost everything, enabling spying, data-harvesting, stalking and fraud attacks, among others.
Critical Cisco Bugs Allow Code Execution on Wireless, SD-WANUnauthenticated cyberattackers can also wreak havoc on networking device configurations.
Week in security with Tony Anscombe
ESET unmasks FamousSparrow APT group – Stopping cloud data leaks – European cybercrime ring busted
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity