Author: Andy Stern
-
Cybersicherheit 2025: Der Schutz industrieller Systeme ist entscheidend
by
in SecurityNewsIm Jahr 2025 wird die OT-Cybersicherheit (Operational Technology) eine Schlüsselrolle beim Schutz industrieller Umgebungen und kritischer Infrastrukturen spielen. Phil Tonkin, Field CTO von Dragos warnt: »Die zunehmende Vernetzung durch die digitale Transformation legt Sicherheitslücken in OT-Systemen offen, die oft ohne Berücksichtigung moderner Bedrohungen entwickelt wurden.« Wachsende Bedrohungen für OT-Systeme Bedrohungen wie die FrostyGoop-Malware, die… First…
-
Romanian National Sentenced to 20 Years for NetWalker Ransomware Attacks
by
in SecurityNewsA Romanian man has been sentenced to 20 years in prison for his role in the devastating NetWalker ransomware attacks. Daniel Christian Hulea, 30, was also ordered to forfeit over... First seen on securityonline.info Jump to article: securityonline.info/romanian-national-sentenced-to-20-years-for-netwalker-ransomware-attacks/
-
Weaponized Hacktivism: How Countries Use Activists for Cyber Warfare
by
in SecurityNewsThe intersection of hacking and activism, commonly known as hacktivism, has transformed into a formidable force in the digital era. Trellix’s latest report explores how these groups are increasingly intertwined... First seen on securityonline.info Jump to article: securityonline.info/weaponized-hacktivism-how-countries-use-activists-for-cyber-warfare/
-
Phishing Campaign Targets European Companies with Fake HubSpot and DocuSign Forms
by
in SecurityNews
Tags: phishingA recent report by Unit 42 researchers has uncovered an extensive phishing campaign targeting European companies, with the automotive, chemical, and industrial compound manufacturing sectors among the hardest hit. The... First seen on securityonline.info Jump to article: securityonline.info/phishing-campaign-targets-european-companies-with-fake-hubspot-and-docusign-forms/
-
TA397 Leverages Sophisticated Spearphishing Techniques to Deploy Malware in Defense Sector
by
in SecurityNewsProofpoint researchers have identified a new spearphishing campaign by TA397, a South Asia-based advanced persistent threat (APT) group also known as Bitter. The campaign, observed on November 18, 2024, targets... First seen on securityonline.info Jump to article: securityonline.info/ta397-leverages-sophisticated-spearphishing-techniques-to-deploy-malware-in-defense-sector/
-
46% of financial institutions had a data breach in the past 24 months
by
in SecurityNewsAs the financial industry is the most targeted sector for data breaches in 2024, it’s now more important than ever to strengthen the industry moving into 2025, according to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/20/financial-industry-data-breaches/
-
Play Ransomware Claims Krispy Kreme Breach, Threatens Data Leak
by
in SecurityNewsKEY SUMMARY POINTS Krispy Kreme, the beloved doughnut chain, disclosed a data breach on December 11, 2024, in… First seen on hackread.com Jump to article: hackread.com/play-ransomware-krispy-kreme-breach-data-leak/
-
LockBit ransomware gang teases February 2025 return
by
in SecurityNewsAn individual associated with the LockBit ransomware gang has broken cover to tease details of a new phase of the cyber criminal operation’s activity, that they claim is set to begin in February 2025 First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366617379/LockBit-ransomware-gang-teases-February-2025-return
-
Neue Aufdeckung der Unit 42: HubPhish-Kampagne zielt auf europäische Unternehmen
by
in SecurityNews
Tags: unclassifiedFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/neuheit-aufdeckung-unit-42-hubphish-kampagne-ziel-europa-unternehmen
-
How Infoblox Streamlines Operations Across Hybrid Settings
by
in SecurityNewsInfoblox CEO Scott Harrell Pushes Unified Strategy Amid Hybrid Cloud Convergence. Scott Harrell, CEO of Infoblox, explores the convergence of network operations, security operations and cloud operations to tackle hybrid infrastructure complexities. He introduces Universal DDI and emphasizes a shift toward proactive threat management to counter AI-driven malware. First seen on govinfosecurity.com Jump to article:…
-
Angesichts digitaler Geschenkflut zu Weihnachten: Mehrheit der Deutschen fordert laut eco-Umfrage bessere Medienkompetenz für Kinder
by
in SecurityNews
Tags: unclassifiedFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/digital-geschenkflut-weihnachten-mehrheit-deutsche-forderung-eco-umfrage-verbesserung-medienkompetenz-kinder
-
Fortinet Addresses Unpatched Critical RCE Vector
by
in SecurityNewsFortinet has patched CVE-2023-34990 in its Wireless LAN Manager (FortiWLM), which combined with CVE-2023-48782 could allow for unauthenticated remote code execution (RCE) and the ability to read all log files. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/fortinet-addresses-unpatched-critical-rce-vector
-
Study finds ‘significant uptick’ in cybersecurity disclosures to SEC
by
in SecurityNews
Tags: cybersecurityHowever, less than 10% of the disclosures addressed the material impacts of the security incidents. First seen on cyberscoop.com Jump to article: cyberscoop.com/sec-cybersecurity-disclosure-uptick-paul-hastings/
-
Arne Schönbohm gewinnt Prozess gegen ZDF in 1. Instanz
by
in SecurityNews
Tags: bsiDer ehemalige Präsident des BSI, Arne Schönbohm, hat seine Klage gegen das ZDF und Aussagen in der Sendung Magazin Royale in erster Instanz weitgehend gewonnen. Vier Aussagen wurden jetzt untersagt, eine Entschädigung von 100.000 Euro lehnte das Gericht aber ab. … First seen on borncity.com Jump to article: www.borncity.com/blog/2024/12/19/arne-schoenbohm-gewinnt-prozess-gegen-zdf-in-1-instanz/
-
BadBox malware botnet infects 192,000 Android devices despite disruption
by
in SecurityNewsThe BadBox Android malware botnet has grown to over 192,000 infected devices worldwide despite a recent sinkhole operation that attempted to disrupt the operation in Germany. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/badbox-malware-botnet-infects-192-000-android-devices-despite-disruption/
-
Latest attempt to override UK’s outdated hacking law stalls
Amendments to the Data Bill that would have given the UK cyber industry a boost by updating restrictive elements of the Computer Misuse Act have failed to progress beyond a Lords committee First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366617109/Latest-attempt-to-override-UKs-outdated-hacking-law-stalls
-
Crypto Roundup: LastPass Breach Linked to $5.4M Crypto Theft
by
in SecurityNewsAlso, CoinLurker Malware Steals Data via Fake Updates. Every week, Information Security Media Group rounds up cybersecurity incidents in digital assets. This week, LastPass breach linked to $5.4M crypto theft, CoinLurker malware steals data via fake updates, cryptocurrency key to 27 million euro seizure and nearly 800 arrested in crypto-romance scam. First seen on govinfosecurity.com…
-
BadRAM-ifications: A Low-Cost Attack on Trusted Execution Environments
by
in SecurityNewsRecent research has uncovered a concerning vulnerability in modern Trusted Execution Environments (TEEs) that challenges fundamental assumptions about memory security. The BadRAM attack, detailed in a paper by De Meulemeester et al., demonstrates how a low-cost hardware manipulation can compromise the integrity guarantees of systems like AMD SEV-SNP (Secure Encrypted Virtualization and Secure Nested Paging)….…
-
Bipartisan bills to protect car owners’ privacy introduced in House and Senate
by
in SecurityNewsThe Auto Data Privacy and Autonomy Act would require automakers to create opt-in mechanisms for vehicle data collection and would bar manufacturers from sharing, selling or leasing customer data without explicit consent]]> First seen on therecord.media Jump to article: therecord.media/bipartisan-bills-car-owner-privacy-introduced-house-senate
-
Orgs Scramble to Fix Actively Exploited Bug in Apache Struts 2
by
in SecurityNewsA newly discovered vulnerability, CVE-2024-53677, in the aging Apache framework is going to cause major headaches for IT teams, since patching isn’t enough to fix it. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/actively-exploited-bug-struts-2
-
2035 Quantum Encryption Deadline Still Achievable
by
in SecurityNewsCISA Says 2035 Quantum Deadline Remains Achievable Despite Recent Breakthroughs. The federal government’s 2035 mandate to adopt quantum-resistant encryption remains feasible despite technological advancements in quantum computing, a top official for the U.S. cyber defense agency told ISMG, but experts warn challenges such as bureaucratic delays and financial costs persist. First seen on govinfosecurity.com Jump…
-
HHS Urges Health Sector to Beef Up OT, IoMT Security
by
in SecurityNewsFeds Warn That Connected Devices Are Prey for Cyberattackers. The security of medical devices has been getting most of the attention from regulators in recent years, but other devices that make up the medical internet of things and operational technology systems are also vulnerable to cyberattacks, federal authorities warned in a new advisory. First seen…
-
Microsoft 365 users hit by random product deactivation errors
by
in SecurityNewsMicrosoft is investigating a known issue randomly triggering “Product Deactivated” errors for customers using Microsoft 365 Office apps. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-365-users-hit-by-random-product-deactivation-errors/
-
UK ICO Criticizes Google Advertising Policy Update
by
in SecurityNewsData Protection Authority Says Change Isn’t Green Light for Device Fingerprinting. The U.K. data regulator blasted Google Thursday for a changes to policies governing online advertising the government agency says amount to bestowing permission to track users by the indelible fingerprint of their devices. Businesses do not have free rein to use fingerprinting, the office…
-
6 Security Vendors Named ‘Leaders’ In Gartner’s Inaugural Email Security Magic Quadrant
by
in SecurityNewsThe first-ever Gartner Magic Quadrant ranking for Email Security Platforms included six companies in the “Leaders” category and 14 companies in total. First seen on crn.com Jump to article: www.crn.com/news/security/2024/6-security-vendors-named-leaders-in-gartner-s-inaugural-email-security-magic-quadrant
-
Protecting Your Heart and Wallet: A Guide to Safe Charitable Giving
by
in SecurityNewsThe holiday season brings out the best in people, with many feeling inspired to support worthy causes. Unfortunately, it also attracts scammers who prey on this generosity. Here’s how to ensure your donations reach legitimate charities while protecting your personal and financial information. Verify Before You Give Before opening your wallet, take these essential steps……
-
Israeli court to hear U.S. extradition request for alleged LockBit developer
by
in SecurityNewsRostislav Panev allegedly served as a software developer for LockBit. First seen on cyberscoop.com Jump to article: cyberscoop.com/rostislav-panev-lockbit-israel-extradition/
-
We told Post Office about system problems at the highest level, Fujitsu tells Horizon Inquiry
by
in SecurityNews
Tags: officeState-owned retail company was not subordinate to Japanese multinational in technical matters, legal rep says First seen on theregister.com Jump to article: www.theregister.com/2024/12/18/we_told_post_office_about/
-
Google Calendar leveraged to facilitate stealthy phishing
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/google-calendar-leveraged-to-facilitate-stealthy-phishing
-
European firms subjected to HubSpot-exploiting phishing
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/european-firms-subjected-to-hubspot-exploiting-phishing