After Nuclear Site Blackout, Thunder From Iran, and Silence From U.S.

After Nuclear Site Blackout, Thunder From Iran, and Silence From U.S.

JERUSALEM — The last time the centrifuges crashed at Iran’s underground nuclear fuel-production center at Natanz, more than a decade ago, the sabotage was the result of a joint Israeli-American cyberattack intended to slow Tehran’s progress toward nuclear weapons and force a diplomatic negotiation. When they crashed again this weekend, the White House asserted that…

New Critical Vulnerabilities Found in Microsoft Exchange Server

New Critical Vulnerabilities Found in Microsoft Exchange Server

Yesterday, the NSA alerted Microsoft of a new batch of critical vulnerabilities that threat actors could exploit to remotely compromise the Exchange Server email software program. The tech giant said that it hadn’t seen any hacks using the vulnerabilities on its customers, but the news comes at a time of great concern over bugs in…

FBI Agents Secretly Deleted Web Shells From Hacked Microsoft Exchange Servers

FBI Agents Secretly Deleted Web Shells From Hacked Microsoft Exchange Servers

FBI Agents Secretly Deleted Web Shells From Hacked Microsoft Exchange Servers | IT Security News 14. April 2021 FBI agents executed a court-authorized cyber operation to delete malicious web shells from hundreds of previously hacked Microsoft Exchange servers in the United States, unbeknownst to their owners, the U.S. Department of Justice (DoJ) said Tuesday. Like…

Hackers Abuse Website Contact Forms To Deliver Sophisticated IcedID Malware

Hackers Abuse Website Contact Forms To Deliver Sophisticated IcedID Malware

Hackers Abuse Website Contact Forms To Deliver Sophisticated IcedID Malware | IT Security News 14. April 2021 Like this: Like Loading… Related Tags: GBHackers On Security Sponsors Endpoint Cybersecurity www.endpoint-cybersecurity.com – Consulting in building your security products– Employee awareness training– Security tests for applications and pentesting… and more. Daily Summary Categories CategoriesSelect Category(ISC)2 Blog  (323)(ISC)2 Blog…

What Does It Take To Be a Cybersecurity Researcher?

What Does It Take To Be a Cybersecurity Researcher?

Behind the strategies and solutions needed to counter today’s cyber threats are—dedicated cybersecurity researchers. They spend their lives dissecting code and analyzing incident reports to discover how to stop the bad guys. But what drives these specialists? To understand the motivations for why these cybersecurity pros do what they do, we decided to talk with…

Compromised Microsoft Exchange Server Used to Host Cryptominer

Compromised Microsoft Exchange Server Used to Host Cryptominer

Compromised Microsoft Exchange Server Used to Host Cryptominer | IT Security News 13. April 2021 Researchers say an unknown attacker is targeting vulnerable Exchange Servers with a payload hosted on a compromised Exchange Server. Like this: Like Loading… Related Tags: Dark Reading: Sponsors Endpoint Cybersecurity www.endpoint-cybersecurity.com – Consulting in building your security products– Employee awareness…

Iran Nuclear Facility Potential Cyber Attack – What Expert Says

Iran Nuclear Facility Potential Cyber Attack – What Expert Says

Iran Nuclear Facility Potential Cyber Attack – What Expert Says | IT Security News Tags: Information Security Buzz Sponsors Endpoint Cybersecurity www.endpoint-cybersecurity.com – Consulting in building your security products– Employee awareness training– Security tests for applications and pentesting… and more. Daily Summary Categories CategoriesSelect Category(ISC)2 Blog  (323)(ISC)2 Blog infosec  (13)(ISC)² Blog  (340)2020-12-08 – Files for an ISC diary…

NSA Discovers New Vulnerabilities Affecting Microsoft Exchange Servers

NSA Discovers New Vulnerabilities Affecting Microsoft Exchange Servers

In its April slate of patches, Microsoft rolled out fixes for a total of 114 security flaws, including an actively exploited zero-day and four remote code execution bugs in Exchange Server. Of the 114 flaws, 19 are rated as Critical, 88 are rated Important, and one is rated Moderate in severity. Chief among them is…

Mossad behind attack on Iran’s nuclear site: Israeli radio cites intelligence sources

Mossad behind attack on Iran’s nuclear site: Israeli radio cites intelligence sources

Israeli public radio cited intelligence sources as saying that Israel’s Mossad spy agency carried out a cyber-attack on Iran’s Natanz nuclear facility. Kan Radio’s report, which cited unnamed sources, said the attack on Natanz was “an Israeli cyber-attack in which the Mossad was involved… [and] the damage to the Iranian facility is greater than reported”…

White House Names National Cyber Director, CISA Chief

White House Names National Cyber Director, CISA Chief

President Joe Biden plans to nominate Chris Inglis to serve as the country’s first national cyber director, Jen Easterly to direct the Cybersecurity and Infrastructure Security Agency, and additional Homeland Security Department leaders. Lawmakers of the Cyberspace Solarium Commission, where both nominees delivered input, praised their selection Monday.    Inglis, a former deputy director of the…