CVE-2021-37708
CVE-2021-37708
US President Joe Biden has increased pressure on Russian President Vladimir Putin to move against ransomware groups operating in Russia, warning the United States is prepared to respond if hacks are not stopped. The two leaders held an hour-long phone call on Friday, their first since they discussed ransomware attacks at a summit in Geneva…
A new Unc0ver jailbreak tool works on almost every iPhone, including the iPhone 12. It is based on the same vulnerability Apple said may have been been actively exploited by hackers. The approach works on iPhones running iOS 11 through to iOS 14.3, as Apple patched the flaws in iOS 14.4… TechCrunch reports: In a…
Endpoint Security , Fraud Management & Cybercrime , Governance & Risk Management We Aren’t ‘Live,’ But Have Mobilized to Share Top Insights From Industry’s Leaders Tom Field (SecurityEditor) • May 17, 2021 One view of RSA in a previous, non-virtual form Where to begin? Rohit Ghai, the CEO of RSA, discusses the new…
Fraud Management & Cybercrime , Governance & Risk Management , Patch Management FireEye: Attacks Happened Before Patch Issued for VPN Vulnerability Doug Olenick (DougOlenick) • April 30, 2021 A cyberthreat gang that’s been active since 2020 exploited a now-patched zero-day vulnerability in the SonicWall SMA 100 Series appliance to plant ransomware in attacks…
Business Continuity Management / Disaster Recovery , Fraud Management & Cybercrime , Governance & Risk Management 2 Maryland Towns Report Malware on Their Networks Doug Olenick (DougOlenick) • July 8, 2021 REvil’s darknet announcement offering a decryptor for sale (Source: Trustwave) Two small Maryland towns are among the latest victims to come to…
LemonDuck was first discovered in China in 2019 as a cryptocurrency botnet that used affected systems for Monero mining. According to a new report from Microsoft 365 Defender Threat Intelligence Team, a revamped version of LemonDuck crypto-mining malware is now targeting Windows and Linux devices. The malware lets threat actors insert backdoors, steal credentials, and conduct a…