China-Based Billbug APT Infiltrates Certificate Authority
The state-sponsored cyberattack group known as Billbug managed to compromise a digital certificate authority (CA) as part of an wide-ranging espionage campaign that stretched back to March — a...
Ukraine’s ‘IT Army’ Stops 1,300 Cyberattacks in 8 Months of War
Ukrainian President Volodymyr Zelensky spoke to the G20 Summit's "Digital Transformation" panel this week, offering the benefits of his embattled country's cyber-defense experience to G20-allied countries. Zelensky noted that...
Wipermania: Malware Remains a Potent Threat, 10 Years Since ‘Shamoon’
Destructive wiper malware has evolved very little since the "Shamoon" virus crippled some 30,000 client and server systems at Saudi Aramco more than 10 years ago. Yet it remains as...
Neosec Introduces Automated Tokenization to Enable Full API Visibility Without Exposure of Sensitive Data
PALO ALTO, Calif., Nov. 15, 2022 /PRNewswire/ — Neosec, the pioneer in discovering and identifying API threats using behavioral analytics, today announced that it now tokenizes API activity data to...
Red Canary Provides First-Ever MITRE Engenuity™ ATT&CK® Evaluations for Managed Services
DENVER, Nov. 15, 2022 /PRNewswire/ — Red Canary, a leader in Managed Detection and Response (MDR), is one of 15 providers that participated in the first-ever MITRE Engenuity™ ATT&CK®...
Australia Declares War on Cybercrime Syndicates
Australian authorities have announced a new offensive against cybercrime, standing up a a joint operation between the Australian Federal Police and the Australian Signals Directorate to disrupt cybercriminal operations. The...
Researchers Sound Alarm on Dangerous BatLoader Malware Dropper
A dangerous new malware loader with features for determining whether it's on a business system or a personal computer has begun rapidly infecting systems worldwide over the past few...
Unpatched Zimbra Platforms Are Probably Compromised, CISA Says
Security teams running unpatched, Internet-connected Zimbra Collaboration Suites (ZCS) should just go ahead and assume compromise, and take immediate detection and response action.That's according to a new alert issued...
Cookies for MFA Bypass Gain Traction Among Cyberattackers
When the malware group Lapsus$ needed to gain access to systems compromised in recent breaches, it not only searched for passwords but also for the session tokens — that...
Uyghurs Targeted With Spyware, Courtesy of PRC
As part of its widely documented, brutal suppression of Muslim Uyghur populations, the Chinese government has been deploying spyware to hunt down what it deems to be "religious extremists"...