Chinese APT Groups Targeted Asian Telecoms

Chinese APT Groups Targeted Asian Telecoms

Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Fraud Risk Management Cybereason: Attacks Exploited Microsoft Exchange Servers Dan Gunderman (dangun127) • August 3, 2021     (Photo: David Yu/Pixabay) Chinese advanced persistent threat groups compromised networks of telecommunication providers across Southeast Asia in an effort to harvest customers’ sensitive communications, according to a…

Raccoon Stealer Spreads Malware Via Google SEO

Raccoon Stealer Spreads Malware Via Google SEO

The enhanced version of the Raccoon stealer-as-a-service platform, found to be bundled with updated malware, is hidden in pirated software where it collects cryptocurrency coins and installs a software dropper to spread more malware, according to Threat Post.  The threat actors who used the Raccoon Stealer platform to commit various cybercrimes have expanded their services…

Apple stops iOS 14.7 code signing following release of iOS 14.7.1 | #ios | #apple | #iossecurity | #cybersecurity | #infosecurity | #hacker | National Cyber Security

Apple stops iOS 14.7 code signing following release of iOS 14.7.1 | #ios | #apple | #iossecurity | #cybersecurity | #infosecurity | #hacker | National Cyber Security

Following the release of a security-focused point update to iOS in July, Apple on Monday ceased signing code for iOS 14.7. Apple pushed out iOS 14.7.1 just over a week ago to patch a security vulnerability that may have been exploited in the wild. The release also included a fix for a bug that prevented…

New CISA and NSA Guidance Details Steps to Harden Kubernetes Systems

New CISA and NSA Guidance Details Steps to Harden Kubernetes Systems

New guidance from the United States Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) provides information on the steps that administrators can take to minimize risks associated with Kubernetes deployments. An open source container orchestration system for deploying and managing applications in containers, Kubernetes is often deployed in cloud environments. Improperly…

White House Takes on Securing Critical Infrastructure Control Systems

White House Takes on Securing Critical Infrastructure Control Systems

Attacks targeting critical infrastructure have been on the rise in recent years. Back in 2019, for instance, 56% of utility professionals responsible for overseeing risk in their organizations’ operational technology (OT) assets told Siemens and the Ponemon Institute that they experience at least one shutdown or operational data loss event a year. That’s about the…

Kubernetes Security Recommendations Were Published by the NSA and CISA

Kubernetes Security Recommendations Were Published by the NSA and CISA

One of the more popular solutions used when deploying, scaling, and managing containerized apps in the Cloud, the Kubernetes containers are often threat actors’ targets. This is the main reason that made the NSA and CISA publish a set of recommendations to help organizations strengthen their security. Source The 52-page cybersecurity technical report released by…

White House Takes on Securing Critical Infrastructure Control Systems

White House Takes on Securing Critical Infrastructure Control Systems

Attacks targeting critical infrastructure have been on the rise in recent years. Back in 2019, for instance, 56% of utility professionals responsible for overseeing risk in their organizations’ operational technology (OT) assets told Siemens and the Ponemon Institute that they experience at least one shutdown or operational data loss event a year. That’s about the…

Ransomware Attack on Corona Virus Italian Vaccination Registration System

Ransomware Attack on Corona Virus Italian Vaccination Registration System

A Cyber Attack has reportedly disrupted the Corona Virus vaccine registration system from morning hours of today and authorities are clueless on when the digital vaccine registration system will be working normally. Going deep into the details, the population living in Lazio Region, including some from Rome were badly affected by the attack that is…

7 Federal Agencies Still Lack Basic Cybersecurity

7 Federal Agencies Still Lack Basic Cybersecurity

Governance & Risk Management , Government , Industry Specific Congressional Report Highlights a Lack of Progress Doug Olenick (DougOlenick) • August 3, 2021     A congressional report examining eight federal agencies found that seven continue to improperly protect sensitive data and do not meet basic cybersecurity standards. See Also: Live Panel | How Organizations…

SolarWinds hackers compromised email accounts of employees at 27 US Attorneys’ offices

SolarWinds hackers compromised email accounts of employees at 27 US Attorneys’ offices

Threat actors behind the widespread SolarWinds cyberespionage campaign breached Microsoft Office 365 email accounts belonging to employees at 27 US attorneys’ offices, the US Department of Justice said Friday. The list of impacted offices includes several large and high-profile ones like those in New York, Los Angeles, Miami, Washington and the Eastern District of Virginia….