Chinese APT Groups Targeted Asian Telecoms

Chinese APT Groups Targeted Asian Telecoms

Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Fraud Risk Management Cybereason: Attacks Exploited Microsoft Exchange Servers Dan Gunderman (dangun127) • August 3, 2021     (Photo: David Yu/Pixabay) Chinese advanced persistent threat groups compromised networks of telecommunication providers across Southeast Asia in an effort to harvest customers’ sensitive communications, according to a…

Raccoon Stealer Spreads Malware Via Google SEO

Raccoon Stealer Spreads Malware Via Google SEO

The enhanced version of the Raccoon stealer-as-a-service platform, found to be bundled with updated malware, is hidden in pirated software where it collects cryptocurrency coins and installs a software dropper to spread more malware, according to Threat Post.  The threat actors who used the Raccoon Stealer platform to commit various cybercrimes have expanded their services…

Apple stops iOS 14.7 code signing following release of iOS 14.7.1 | #ios | #apple | #iossecurity | #cybersecurity | #infosecurity | #hacker | National Cyber Security

Apple stops iOS 14.7 code signing following release of iOS 14.7.1 | #ios | #apple | #iossecurity | #cybersecurity | #infosecurity | #hacker | National Cyber Security

Following the release of a security-focused point update to iOS in July, Apple on Monday ceased signing code for iOS 14.7. Apple pushed out iOS 14.7.1 just over a week ago to patch a security vulnerability that may have been exploited in the wild. The release also included a fix for a bug that prevented…

New CISA and NSA Guidance Details Steps to Harden Kubernetes Systems

New CISA and NSA Guidance Details Steps to Harden Kubernetes Systems

New guidance from the United States Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) provides information on the steps that administrators can take to minimize risks associated with Kubernetes deployments. An open source container orchestration system for deploying and managing applications in containers, Kubernetes is often deployed in cloud environments. Improperly…

White House Takes on Securing Critical Infrastructure Control Systems

White House Takes on Securing Critical Infrastructure Control Systems

Attacks targeting critical infrastructure have been on the rise in recent years. Back in 2019, for instance, 56% of utility professionals responsible for overseeing risk in their organizations’ operational technology (OT) assets told Siemens and the Ponemon Institute that they experience at least one shutdown or operational data loss event a year. That’s about the…

Kubernetes Security Recommendations Were Published by the NSA and CISA

Kubernetes Security Recommendations Were Published by the NSA and CISA

One of the more popular solutions used when deploying, scaling, and managing containerized apps in the Cloud, the Kubernetes containers are often threat actors’ targets. This is the main reason that made the NSA and CISA publish a set of recommendations to help organizations strengthen their security. Source The 52-page cybersecurity technical report released by…

White House Takes on Securing Critical Infrastructure Control Systems

White House Takes on Securing Critical Infrastructure Control Systems

Attacks targeting critical infrastructure have been on the rise in recent years. Back in 2019, for instance, 56% of utility professionals responsible for overseeing risk in their organizations’ operational technology (OT) assets told Siemens and the Ponemon Institute that they experience at least one shutdown or operational data loss event a year. That’s about the…

Ransomware Attack on Corona Virus Italian Vaccination Registration System

Ransomware Attack on Corona Virus Italian Vaccination Registration System

A Cyber Attack has reportedly disrupted the Corona Virus vaccine registration system from morning hours of today and authorities are clueless on when the digital vaccine registration system will be working normally. Going deep into the details, the population living in Lazio Region, including some from Rome were badly affected by the attack that is…