Wednesday, April 3, 2024

Google Chrome Beta Tests New DBSC Protection Against Cookie-Stealing Attacks

Google on Tuesday said it's piloting a new feature in Chrome called Device Bound Session Credentials (DBSC) to help protect users against session cookie theft by malware.
The prototype – currently tested against "some" Google Account users running Chrome Beta – is built with an aim to make it an open web standard, the tech giant's Chromium team said.
"By binding authentication sessions to the


http://dlvr.it/T520nd

Brinqa Unveils Major Platform Update to Turbocharge a New Approach to Managing Threat Exposures - Yahoo Finance

Brinqa Unveils Major Platform Update to Turbocharge a New Approach to Managing Threat Exposures  Yahoo Finance


http://dlvr.it/T51Cym

Tuesday, April 2, 2024

U.S. government board calls Microsoft's security practices "inadequate" - Axios

U.S. government board calls Microsoft's security practices "inadequate"  Axios


http://dlvr.it/T4zs4N

Prioritizing Cyber Risk: Get a leg up with AI - Security Boulevard

Prioritizing Cyber Risk: Get a leg up with AI  Security Boulevard


http://dlvr.it/T4zrs2

DHS report rips Microsoft for ‘cascade’ of errors in China hack - The Washington Post

DHS report rips Microsoft for ‘cascade’ of errors in China hack  The Washington Post


http://dlvr.it/T4zrlc

Navigating the Maze: A Measured Approach to AI Adoption in Cybersecurity - Security Boulevard

Navigating the Maze: A Measured Approach to AI Adoption in Cybersecurity  Security Boulevard


http://dlvr.it/T4zKXD

Tag Report Authored by Dr. Edward Amoroso Reveals Endpoint Backup Is Essential to Improving Data Resiliency and ... - StreetInsider.com

Tag Report Authored by Dr. Edward Amoroso Reveals Endpoint Backup Is Essential to Improving Data Resiliency and ...  StreetInsider.com


http://dlvr.it/T4yXc4

Monday, April 1, 2024

XZ Utils Backdoor Implanted in Intricate Supply Chain Attack - Dark Reading

XZ Utils Backdoor Implanted in Intricate Supply Chain Attack  Dark Reading


http://dlvr.it/T4xBWV

RTX cyber and intel business becomes Nightwing following sale - C4ISRNET

RTX cyber and intel business becomes Nightwing following sale  C4ISRNET


http://dlvr.it/T4xBK2

China, Russia, and Iran Pose Growing Cyberthreats to U.S. Infrastructure - Foreign Policy

China, Russia, and Iran Pose Growing Cyberthreats to U.S. Infrastructure  Foreign Policy


http://dlvr.it/T4xB9b

Indian Government Rescues 250 Citizens Forced into Cybercrime in Cambodia

The Indian government said it has rescued and repatriated about 250 citizens in Cambodia who were held captive and coerced into running cyber scams.
The Indian nationals "were lured with employment opportunities to that country but were forced to undertake illegal cyber work," the Ministry of External Affairs (MEA) said in a statement, adding it had rescued 75 people in the past three


http://dlvr.it/T4wjWK

Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, enabling its operators to remotely interact with a mobile device and harvest sensitive data.
"Vultur has also started masquerading more of its malicious activity by encrypting its C2 communication, using multiple encrypted payloads that are decrypted


http://dlvr.it/T4w2YS

Friday, March 29, 2024

Plan to resuscitate beleaguered vulnerability database draws criticism - CyberScoop

Plan to resuscitate beleaguered vulnerability database draws criticism  CyberScoop


http://dlvr.it/T4pqky

Major Shifts in Store for Cybersecurity Landscape by 2028 - Risk & Insurance - Workers Comp Forum

Major Shifts in Store for Cybersecurity Landscape by 2028 - Risk & Insurance  Workers Comp Forum


http://dlvr.it/T4pqbQ

PetroperĂș Selects Honeywell Cybersecurity Solutions to Bolster Cyber Resiliency - Automation.com

PetroperĂș Selects Honeywell Cybersecurity Solutions to Bolster Cyber Resiliency  Automation.com


http://dlvr.it/T4pYly

Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds

Security vulnerabilities discovered in Dormakaba's Saflok electronic RFID locks used in hotels could be weaponized by threat actors to forge keycards and stealthily slip into locked rooms.
The shortcomings have been collectively named Unsaflok by researchers Lennert Wouters, Ian Carroll, rqu, BusesCanFly, Sam Curry, sshell, and Will Caruana. They were reported to the Zurich-based


http://dlvr.it/T4pDxb

PyPI Halts Sign-Ups Amid Surge of Malicious Package Uploads Targeting Developers

The maintainers of the Python Package Index (PyPI) repository briefly suspended new user sign-ups following an influx of malicious projects uploaded as part of a typosquatting campaign.
PyPI said "new project creation and new user registration" was temporarily halted to mitigate what it said was a "malware upload campaign." The incident was resolved 10 hours later, on March 28, 2024, at 12:56


http://dlvr.it/T4nrzc

Thursday, March 28, 2024

CISA teases cyber incident reporting rule for critical infrastructure - Compliance Week

CISA teases cyber incident reporting rule for critical infrastructure  Compliance Week


http://dlvr.it/T4mN8n

Education Dept. launches council to stop K-12 cyberattacks - StateScoop

Education Dept. launches council to stop K-12 cyberattacks  StateScoop


http://dlvr.it/T4mMyN

US offers $10 million reward for information on BlackCat ransomware gang. - The CyberWire

US offers $10 million reward for information on BlackCat ransomware gang.  The CyberWire


http://dlvr.it/T4m3XP

Darcula Phishing Network Leveraging RCS and iMessage to Evade Detection

A sophisticated phishing-as-a-service (PhaaS) platform called Darcula has set its sights on organizations in over 100 countries by leveraging a massive network of more than 20,000 counterfeit domains to help cyber criminals launch attacks at scale.
"Using iMessage and RCS rather than SMS to send text messages has the side effect of bypassing SMS firewalls, which is being used to great


http://dlvr.it/T4lgls

Telegram Offers Premium Subscription in Exchange for Using Your Number to Send OTPs

In June 2017, a study of more than 3,000 Massachusetts Institute of Technology (MIT) students published by the National Bureau for Economic Research (NBER) found that 98% of them were willing to give away their friends' email addresses in exchange for free pizza.
"Whereas people say they care about privacy, they are willing to relinquish private data quite easily when


http://dlvr.it/T4lDrr

Wednesday, March 27, 2024

SBU to receive $450,000 to develop Cyber Operations Center - St. Bonaventure

SBU to receive $450,000 to develop Cyber Operations Center  St. Bonaventure


http://dlvr.it/T4jfQ8

U.S. Publishes Draft Federal Rules for Cyber Incident Reporting - The Wall Street Journal

U.S. Publishes Draft Federal Rules for Cyber Incident Reporting  The Wall Street Journal


http://dlvr.it/T4jfBF

UK Cybercrime agency warns AI will turbocharge hacking - Panda Security

UK Cybercrime agency warns AI will turbocharge hacking  Panda Security


http://dlvr.it/T4jKqj

A financial crisis has engulfed French cyber-security company Atos as it prepares to play a crucial role during the Games - MDJOnline.com

A financial crisis has engulfed French cyber-security company Atos as it prepares to play a crucial role during the Games  MDJOnline.com


http://dlvr.it/T4hyPd

Two Chinese APT Groups Ramp Up Cyber Espionage Against ASEAN Countries

Two China-linked advanced persistent threat (APT) groups have been observed targeting entities and member countries affiliated with the Association of Southeast Asian Nations (ASEAN) as part of a cyber espionage campaign over the past three months.
This includes the threat actor known as Mustang Panda, which has been recently linked to cyber attacks against Myanmar as well as


http://dlvr.it/T4hWd6

Tuesday, March 26, 2024

Not WWIII: Experts say Key Bridge collapse “almost certainly not” from planned attack - The Baltimore Banner

Not WWIII: Experts say Key Bridge collapse “almost certainly not” from planned attack  The Baltimore Banner


http://dlvr.it/T4fyDl

Malicious NuGet Package Linked to Industrial Espionage Targets Developers

Threat hunters have identified a suspicious package in the NuGet package manager that's likely designed to target developers working with tools made by a Chinese firm that specializes in industrial- and digital equipment manufacturing.
The package in question is SqzrFramework480, which ReversingLabs said was first published on January 24, 2024. It has been downloaded 


http://dlvr.it/T4ffc0

UK and US accuse China of cyberattacks, NCSC releases cybersecurity guidance - Techerati

UK and US accuse China of cyberattacks, NCSC releases cybersecurity guidance  Techerati


http://dlvr.it/T4fHSx

U.S. Sanctions 3 Cryptocurrency Exchanges for Helping Russia Evade Sanctions

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) sanctioned three cryptocurrency exchanges for offering services used to evade economic restrictions imposed on Russia following its invasion of Ukraine in early 2022.
This includes Bitpapa IC FZC LLC, Crypto Explorer DMCC (AWEX), and Obshchestvo S Ogranichennoy Otvetstvennostyu Tsentr Obrabotki Elektronnykh Platezhey (


http://dlvr.it/T4dsQw

CISA Alerts on Active Exploitation of Flaws in Fortinet, Ivanti, and Nice Products

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday placed three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.
The vulnerabilities added are as follows -

CVE-2023-48788 (CVSS score: 9.3) - Fortinet FortiClient EMS SQL Injection Vulnerability
CVE-2021-44529 (CVSS score: 9.8) - Ivanti


http://dlvr.it/T4dsB1

Monday, March 25, 2024

Understanding The NIS2 Directive: How Will Europe Be Protected From Cyber Threats? - Dataconomy

Understanding The NIS2 Directive: How Will Europe Be Protected From Cyber Threats?  Dataconomy


http://dlvr.it/T4bdQL

Hackers Hijack GitHub Accounts in Supply Chain Attack Affecting Top-gg and Others

Unidentified adversaries orchestrated a sophisticated attack campaign that has impacted several individual developers as well as the GitHub organization account associated with Top.gg, a Discord bot discovery site.
"The threat actors used multiple TTPs in this attack, including account takeover via stolen browser cookies, contributing malicious code with verified commits, setting up a custom


http://dlvr.it/T4bDnw

Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account

In January 2024, Microsoft discovered they’d been the victim of a hack orchestrated by Russian-state hackers Midnight Blizzard (sometimes known as Nobelium). The concerning detail about this case is how easy it was to breach the software giant. It wasn’t a highly technical hack that exploited a zero-day vulnerability – the hackers used a simple password spray attack to take control of


http://dlvr.it/T4bDQl

New "GoFetch" Vulnerability in Apple M-Series Chips Leaks Secret Encryption Keys

A new security shortcoming discovered in Apple M-series chips could be exploited to extract secret keys used during cryptographic operations.
Dubbed GoFetch, the vulnerability relates to a microarchitectural side-channel attack that takes advantage of a feature known as data memory-dependent prefetcher (DMP) to target constant-time cryptographic implementations and capture sensitive data


http://dlvr.it/T4bCy0

Iran-Linked MuddyWater Deploys Atera for Surveillance in Phishing Attacks

The Iran-affiliated threat actor tracked as MuddyWater (aka Mango Sandstorm or TA450) has been linked to a new phishing campaign in March 2024 that aims to deliver a legitimate Remote Monitoring and Management (RMM) solution called Atera.
The activity, which took place from March 7 through the week of March 11, targeted Israeli entities spanning global manufacturing, technology, and


http://dlvr.it/T4bCfT

Google Chrome Beta Tests New DBSC Protection Against Cookie-Stealing Attacks

Google on Tuesday said it's piloting a new feature in Chrome called Device Bound Session Credentials (DBSC) to help protect users agains...