Mercenary Hacking Group Deploys Android Malware

Mercenary Hacking Group Deploys Android Malware

StrongPity Campaign Targeted Syrian E-Governance Website Akshaya Asokan (asokan_akshaya) • July 24, 2021     Hack-for-hire group StrongPity deployed Android malware to target visitors to Syria’s e-government website as part of its latest cyberespionage campaign, security firm Trend Micro reports. See Also: Live Webinar: Seeking Success by Adopting a SASE Architecture: en el idioma Español…

Kaseya did not pay ransom for decryptor, refused to ‘negotiate’ with REvil – Security

Kaseya did not pay ransom for decryptor, refused to ‘negotiate’ with REvil – Security

Kaseya did not negotiate with cyber criminals and pay a ransom following the REvil ransomware attack on July 2 which compromised about 60 MSPs and 1,500 end users. On Monday, the vendor confirmed on its website that it “did not pay a ransom – either directly or indirectly through a third party – to obtain…

Chinese hackers stole Mekong data from Cambodian foreign ministry – sources

Chinese hackers stole Mekong data from Cambodian foreign ministry – sources

A man washes a cow in the Mekong river in Phnom Penh November 7, 2012. REUTERS/Samrang Pring PHNOM PENH/HANOI, July 22 (Reuters) – Buried in a long U.S. indictment accusing China of a global cyberespionage campaign was a curious detail: Among the governments targeted by Chinese hackers was Cambodia, one of Beijing’s most loyal Asian…

Attackers Rely on ‘Exotic’ Languages for Malware Creation

Attackers Rely on ‘Exotic’ Languages for Malware Creation

Cybercrime , Fraud Management & Cybercrime , Fraud Risk Management Blackberry: Newer Programming Languages Help Cybercriminals Evade Detection Rashmi Ramesh • July 26, 2021     The growth of Go, Rust, DLang and Nim to create malware since 2012 (Source: BlackBerry) Malware developers increasingly are relying on “exotic” programming languages – such as Go, Rust,…

18 Companies to Participate in NIST ‘Zero Trust’ Project

18 Companies to Participate in NIST ‘Zero Trust’ Project

Governance & Risk Management , NIST Standards , Standards, Regulations & Compliance Firms Will Demonstrate Their Architectures to Help Agency Develop Guidance Dan Gunderman (dangun127) • July 26, 2021     The National Institute of Standards and Technology has selected 18 technology companies to demonstrate “zero trust” security architectures as it prepares to draft guidance…

Kaseya Obtains a Universal Decryptor to Support REvil Ransomware Victims

Kaseya Obtains a Universal Decryptor to Support REvil Ransomware Victims

Softpedia News / Security 26. July 2021 This article has been indexed from Softpedia News / Security The software vendor Kaseya said on Thursday that it has obtained a universal decryptor for unlocking systems and helping clients to recover data, according to The Hacker News. This happened almost three weeks after the broad-based supply chain…

Discord CDN and API Exploits Drive Wave of Malware Detections

Discord CDN and API Exploits Drive Wave of Malware Detections

This article has been indexed from E Hacking News – Latest Hacker News and IT Security News   As per the researchers, the number of reported Discord malware detections has increased significantly since last year. Even users who have never interacted with Discord are at risk, even though the network is mostly utilized by gamers…

Windows 10 July security updates break printing on some systems

Windows 10 July security updates break printing on some systems

Microsoft says customers may experience printing and scanning issues on devices using smart card (PIV) authentication after installing July 2021 Windows 10 security updates on a domain controller (DC). “After installing updates released July 13, 2021 on domain controllers (DCs) in your environment, printers, scanners, and multifunction devices that are not compliant with section 3.2.1 of RFC 4556…

Hackers Target Kubernetes Using Misconfigured Argo Workflows

Hackers Target Kubernetes Using Misconfigured Argo Workflows

Cryptocurrency Fraud , Fraud Management & Cybercrime , Fraud Risk Management Threat Actors Deploying Cryptominers Akshaya Asokan (asokan_akshaya) • July 26, 2021     A hacking campaign is targeting Kubernetes environments using misconfigured Argo Workflows to deploy cryptominers, according to a report by the security firm Intezer. See Also: Live Webinar | Improve Cloud Threat…