Security

0 Comments
Criminals are using malicious bots to steal information from victims via the popular Telegram and Discord messaging services, said a report this week. Some bots can be rented for as little as $25 a day. The bot-based malware steals credentials, including virtual private network (VPN) client logins, payment card information, cryptocurrency wallets, operating system data,
0 Comments
The UK’s National Crime Agency (NCA) seized millions of pounds’ worth of cryptocurrency last year as part of its efforts to crack down on money laundering and serious and organized crime (SOC). The NCA, which is the UK agency dedicated to tackling SOC, revealed in its latest annual report that during the period April 1
0 Comments
This week HP released their report The Evolution of Cybercrime: Why the Dark Web is Supercharging the Threat Landscape and How to Fight Back, exploring how cyber-criminals are increasingly operating in a quasi-professional manner, with malware and ransomware attacks being offered on a ‘software-as-a-service’ basis. The report’s findings showed how cybercrime is being supercharged through “plug and
0 Comments
Ukrainian radio stations were hacked this week by threat actors to spread fake news about President Volodymyr Zelensky’s health, according to Ukraine’s security officials. A music program on “at least one” out of TAVR Media’s stations – one of Ukraine’s largest radio networks – was interrupted by the false reports just after midday on July 21. The so-far unidentified
0 Comments
by Paul Ducklin Apple has disgorged its latest patches, fixing more than 50 CVE-numbered security vulnerabilities in its range of supported products. The relevant security bulletins, update numbers, and where to find them online are as follows: APPLE-SA-2022-07-20-1: iOS 15.6 and iPadOS 15.6, details at HT213346 APPLE-SA-2022-07-20-2: macOS Monterey 12.5, details at HT213345 APPLE-SA-2022-07-20-3: macOS
0 Comments
The number of ransomware victims in the second quarter was over a third lower than Q1 2022, thanks in part to the halt in operations from the prolific Conti group, according to GuidePoint Security. The firm’s quarterly ransomware report was based on data obtained from publicly available resources, including postings by threat groups on their data
0 Comments
Russian adversaries are taking advantage of trusted cloud services, including DropBox and Google Drive to deliver malware to businesses and governments, according to new research. Cloaked Ursula – AKA the Russian government-linked APT29 or Cozy Bear – is increasingly using popular online storage services because it makes attacks difficult to detect and prevent, researchers at Palo Alto
0 Comments
Security researchers have found a new macOS backdoor being used in targeted attacks to steal sensitive information from victims. The threat has been named “CloudMensis” by ESET because it exclusively uses public cloud storage services to communicate with its operators. Specifically, it leverages pCloud, Yandex Disk and Dropbox to receive commands and exfiltrate files, according to
0 Comments
The Tor Project has updated its flagship anonymizing browser to make it easier for users to evade government attempts to block its use in various regions. Tor Browser 11.5 will “transform the user experience of connecting to Tor from heavily censored regions,” according to the US-based non-profit that manages the open source software. It replaces
0 Comments
This week the US Department of Homeland Security (DHS) released the Cyber Safety Review Board’s (CSRB) first report into the December 2021 Log4j event, where a number of vulnerabilities were reported with this Java-based logging framework. The report’s methodology included a mixture of interviews and requests for information over a 90-day period, engaging with approximately 80 organizations and individuals
0 Comments
by Paul Ducklin It’s prime vacation season in the Northern Hemipshere, and in some countries, July and August aren’t just months when some people take some days off, but a period of extended family holidays, often involving weeks away from home or on the road. The good news, of course, is that if you’ve had
0 Comments
Falling cryptocurrency prices are putting pressure on crypto exchanges on the dark web and causing a “bank run,” security researchers have found. This is making it harder for threat actors to “monetize” their attacks, buy vulnerabilities or fund malware-as-a-service operations. Dov Lerner, security research lead at Cybersixgill, suggested that cryptocurrencies have lost up to $1.8tn
0 Comments
APT groups are increasingly targeting journalists and impersonating media outlets, according to new research from Proofpoint. The groups – who are state-based or state-aligned actors, are looking to gain access to sensitive information and sources, manipulate news and deceive public relations and other industry professionals into thinking that they are dealing with legitimate news outlets. According to
0 Comments
For online shoppers, Amazon Prime Day has become an annual retail event, an opportunity to pick up bargains and save money. However for hackers, it’s also an opportunity to target consumers eager to secure a deal. Cybersecurity company Avanan has warned of an increase in phishing and credential harvesting email attempts in June in advance
0 Comments
French telecoms operator La Poste Mobile has alerted customers that their data may have been compromised in a ransomware attack that targeted the company’s administrative and management systems on July 4.  The attack, believed to have been carried out by the LockBit ransomware group, took the company’s systems offline as it attempted to minimize damage.