While organizations wait for an official patch for the two zero-day flaws in Microsoft Exchange, they should scan their networks for signs of exploitation and apply these mitigations.
Malicious Comm100 files have been found scattered throughout North America, and across sectors including tech, healthcare, manufacturing, telecom, insurance, and others.
External researchers contributed 16 of the 20 security updates included in the new Chrome 106 Stable Channel rollout, including five high-severity bugs.
Shocking phishing numbers (more than 1 million in a single quarter) are being driven by vishing, smishing, and other lures that target mobile devices.
Azure says cloud-native single sign-on with a passwordless option is most-requested new AVD feature in the product’s history.
MITRE’s new FiGHT framework describes adversary tactics and techniques used against 5G systems and networks.
The bug allows unauthenticated code execution on the company’s firewall products, and CISA says it poses “significant risk” to federal government.
Emails purporting to be an update to terms of service for GitHub and CircleCI instead attempt to harvest user credentials.
NSA and CISA release guidance on protecting against cybersecurity threats to operational technology and industrial control systems.
Reduced to pen, paper, and phones, 911 operators ask NYPD for backup in handling emergency calls.
The attack uses hijacked Egress branding and the legit Powtoon video platform to steal user credentials.
Despite an 86% surge in budget resources to defend against ransomware, 90% of orgs were impacted by attacks last year, a survey reveals.
The investment in Salt Security underscores the fact that attacks targeting APIs are increasing.
Pool controllers exposed to the Internet with default passwords let threat actors tweak pool pH levels, and potentially more.
The target has been under relentless DDoS attack, which ultimately set a new packets-per-second record for Europe.
Several models of EZVIZ cameras are open to total remote control by cyberattackers, and image exfiltration and decryption.
New executive order stops short of mandating NIST’s guidelines, but recommends SBOMs for federal agencies across government.
CloudFox is a command-line tool to help penetration testers understand unknown cloud environments.
Unpatched Pixel devices are at risk for escalation of privileges, Google warns.
Analysis shows attackers breached employee credentials with voice phishing and were preparing a ransomware attack against Cisco Systems.
A new group, Monti, appears to have used leaked Conti code, TTPs, and infrastructure approaches to launch its own ransomware campaign.
Instagram and Facebook parent company Meta was slapped with the fine for exposing the personal data of minors.
Hours after Los Angeles Unified School District hit with ransomware attack, CISA issued an alert that threat actors are actively targeting the education sector.
The founder of Let’s Encrypt and an EFF technologist, Eckersley devoted his life’s work to making the Internet safer and more secure.
This is the fourth DeadBolt campaign this year against QNAP customers, but it differs from previous attacks in exploiting an unpatched bug instead of a known vulnerability.
The US government and the Open Source Security Foundation have released guidance to shore up software supply chain security, and now it’s up to developers to act.
TAP assures its customers that it stopped data theft in a recent cyberattack, but the Ragnar Locker ransomware group says it made off with user info.
Neopets has confirmed that its IT systems were compromised from January 2021 through July 2022, exposing 69 million user accounts and source code.
New Golang cyberattacks use deep space images and a new obfuscator to target systems — undetected.
Analysts find five cookie-stuffing extensions, including one that’s Netflix-themed, that track victim browsing and insert rogue IDs into e-commerce sites to rack up fake affiliate payments.
Documents appear to show that Israeli spyware company Intellexa sold a full suite of services around a zero-day affecting both Android and iOS ecosystems.
The FTK 7.6 portfolio promises better integration with other security and network resources, as well as unified analysis of mobile and computer evidence.
The Russia-backed Nobelium APT has pioneered a post-exploitation tool allowing attackers to authenticate as any user.
Center Hospitalier Sud Francilien (CHSF), a hospital outside of Paris, has redirected incoming patients to other medical facilities in the wake of a ransomware attack that began on Aug. 21.
HD Moore’s company has rebranded its IT, IoT, and OT asset discovery tool as the platform rapidly evolves.
The curated detection feature for Chronicle SecOps Suite provides security teams with actionable insights on cloud threats and Windows-based attacks from Google Cloud Threat Intelligence Team.
The high-severity security vulnerability (CVE-2022-2856) is due to improper user-input validation.
All-cash transaction deal that was first announced in April means SailPoint is no longer a publicly traded company.
The tamper protection feature detects attempts to modify files and processes for Microsoft Defender for Endpoints on macOS.
Just as one crop of malware-laced software packages is taken down from the popular Python code repository, a new host arrives, looking to steal a raft of data.