Security news that informs and inspires

All Articles

2327 articles:

ICS Security Requires Private-Public Sector Synergy

Government officials and technology experts call for more collaboration between the public and private sectors when it comes to securing industrial control system environments.

ICS Security, Critical Infrastructure Security, Government

Dell Patches High-Severity Firmware Update Driver Flaws

The high-severity Dell flaws could allow local attackers to gain kernel-mode privileges.

Dell, Vulnerability, Privilege Escalation, Firmware Security

Pulse Secure Releases Patch for VPN Flaw Used in Active Attacks

PulseSecure has released patches for several flaws in its Connect Secure VPN appliance, one of which has been used in active attacks for some time.

Vpn

Rust-Based Buer Malware Variant Emerges

Cybercriminals have rewritten the Buer malware loader in the Rust programming language, in an attempt to avoid detection.

Malware, Rust Programming Language, Spear Phishing

BadAlloc Memory Flaws Found in Dozens of IoT, Embedded Devices

More than 25 memory allocation flaws have been discovered in real time operating systems from Google, Amazon, and many other vendors that are used in IoT devices.

ICS Security, Microsoft

Threat Group Exploits SonicWall Flaw to Deploy FiveHands Ransomware

Researchers shed light on the FiveHands ransomware, which was deployed after a threat group exploited a now-patched SonicWall flaw in January.

Ransomware, Malware, Vulnerability

Ransomware Task Force Proposes Technical, Regulatory Measures to Disrupt Ecosystem

A ransomware task force has proposed a variety of technical, policy, and regulatory means for disrupting ransomware, including tracking Bitcoin transactions more closely and mandating ransom payment disclosures.

Ransomware, Government

Water Pamola Attackers Target Online Shops With Malicious Orders

A threat campaign is relying on cross-site scripting attacks to deliver malware to and steal credentials from online shops.

Malware, Credentials, Ecommerce Security

Ghostwriter Influence Campaign Linked to Espionage Threat Group

The Ghostwriter influence campaign has expanded its targeting and TTPs, with researchers linking parts of it to the UNC1151 threat group.

Disinformation, Threat Actors

Naikon APT Deploys New Nebulae Backdoor

The Naikon APT group attributed to China has been using a new backdoor known as Nebulae in attacks against military organizations in Asia.

APT, China

Apple Patches MacOS Flaw Exploited By Shlayer Malware

The macOS vulnerability allowed attackers to bypass Apple’s core security defenses with specially-crafted application bundles.

Apple, Osx Malware, Malware, Zero Day

Law Enforcement Update Kills Emotet on Infected Devices

An uninstall process, pushed out to infected devices as part of the takedown of Emotet by law enforcement, has been triggered to kill the malware.

Emotet, Malware, Cybercrime, Botnet

Supply Chain Attack Hits Passwordstate Password Manager

An attacker was able to compromise the update mechanism for the Click Studios Passwordstate password manager and insert a malicious DLL that harvested victims' usernames and passwords.

Supply Chain

Majority of U.S. Government Agencies Have Launched VDPs

On the heels of a September mandate from CISA, 90 percent of cabinet-level agencies have now published a vulnerability-disclosure policy (VDP).

Government, Government Agencies, Vulnerability Disclosure, Vulnerability Management

Researchers Find New Chunk of SolarWinds Attackers’ Infrastructure

Researchers from RiskIQ have identified 18 additional C2 servers used by the APT29 attackers in their operation against SolarWinds and its customers.

Solarwinds