Security Affairs

Security Affairs Read, think, share ā€¦ Security is everyone’s responsibility

  • GitCaught campaign relies on Github and Filezilla to deliver multiple malware
    by Pierluigi Paganini on May 20, 2024 at 2:20 pm

    Researchers discovered a sophisticated cybercriminal campaign by Russian-speaking threat actors that used GitHub to distribute malware. Recorded Futureā€™s Insikt Group discovered a sophisticated cybercriminal campaign by Russian-speaking threat actors from the Commonwealth of Independent States (CIS). The attackers, tracked as GitCaught, used a GitHub profile to impersonate legitimate software applications, including 1Password, Bartender 5, and

  • Two students uncovered a flaw that allows to use laundry machines for free
    by Pierluigi Paganini on May 20, 2024 at 10:16 am

    Two students discovered a security flaw in over a million internet-connected laundry machines that could allow laundry for free. CSC ServiceWorks is a company that provides laundry services and air vending solutions for multifamily housing, academic institutions, hospitality, and other commercial sectors. They manage and operate many internet-connected laundry machines and systems, offering services such

  • Grandoreiro Banking Trojan is back and targets banks worldwide
    by Pierluigi Paganini on May 20, 2024 at 6:17 am

    A new GrandoreiroĀ banking trojan campaign has been ongoing since March 2024, following the disruption by law enforcement in January. IBM X-Force warns of a new GrandoreiroĀ banking trojan campaign that has been ongoing since March 2024. Operators behind the Grandoreiro banking trojan have resumed operations following a law enforcement takedown in January. The recent campaign is

  • Healthcare firm WebTPA data breach impacted 2.5 million individuals
    by Pierluigi Paganini on May 19, 2024 at 2:04 pm

    WebTPA, a third-party administrator that provides healthcare management and administrative services, disclosed a data breach. WebTPA is a third-party administrator that provides healthcare management and administrative services. The US company disclosed a data breach that impacted almost 2.5 million people. According to the report sent by the WebTPA to the U.S. Department of Health and

  • Security Affairs newsletter Round 472 by Pierluigi Paganini ā€“ INTERNATIONAL EDITION
    by Pierluigi Paganini on May 19, 2024 at 12:41 pm

    A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. North Korea-linked IT workers infiltrated hundreds of US firms Turla APT used two new backdoors to

  • North Korea-linked Kimsuky used a new Linux backdoor in recent attacks
    by Pierluigi Paganini on May 19, 2024 at 11:13 am

    Symantec warns of a new Linux backdoor used by the North Korea-linked Kimsuky APT in a recent campaign against organizations in South Korea.Ā  Symantec researchers observed the North Korea-linked group Kimsuky using a new Linux backdoor dubbed Gomir. The malware is a version of the GoBear backdoor which was delivered in a recent campaign by

  • North Korea-linked IT workers infiltrated hundreds of US firms
    by Pierluigi Paganini on May 18, 2024 at 2:52 pm

    The U.S. Justice Department charged five individuals, including a U.S. woman, for aiding North Korea-linked IT workers to infiltrate 300 firms. The Justice Department unsealed charges against an Arizona woman, a Ukrainian man, and three unidentified foreign nationals accused of aiding overseas IT workers, pretending to be U.S. citizens, to infiltrate hundreds of firms in

  • Turla APT used two new backdoors to infiltrate a European ministry of foreign affairs
    by Pierluigi Paganini on May 17, 2024 at 9:24 pm

    Russia-linked Turla APT allegedly used two new backdoors, named Lunar malware and LunarMail, to target European government agencies. ESET researchers discovered two previously unknown backdoors named LunarWeb and LunarMail that were exploited to breach European ministry of foreign affairs. The two backdoors are designed to carry out a long-term compromise in the target network, data

  • City of Wichita disclosed a data breach after the recent ransomware attack
    by Pierluigi Paganini on May 17, 2024 at 1:04 pm

    The City of Wichita disclosed a data breach after the ransomware attack that hit the Kansasā€™s city earlier this month. On May 5th, 2024, the City of Wichita, Kansas, was the victim of a ransomware attack and shut down its network to contain the threat. The city immediately started its incident response procedure to prevent

  • CISA adds D-Link DIR router flaws to its Known Exploited Vulnerabilities catalog
    by Pierluigi Paganini on May 17, 2024 at 10:20 am

    CISA adds two D-Link DIR-600 and DIR-605 routerĀ vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA)Ā added the following D-Link routerĀ vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog: According toĀ Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities

Websitecyber related posts:

Deep Fake Scams in Australia

Thousands of Australians have fallen victim to these sophisticated deep fake scams, causing them to lose their hard-earned money.

Archlinux Security

Archlinux Security is the community's central source for information on Linux and open source security. We follow the open source trends as they affect the comm...

Technologies

Technologies Security industry new products and innovations.

WiGLE WiFi Wireless News

WiGLE News WiFi wireless networking database and mapping.

Ascension Hospital Cyber Attack

A massive cyber attack targeting Ascension, one of the largest healthcare systems in the United States, is causing widespread disruption.

The Hidden World Of Non-Consensual Videos

These private videos and intimate images are uploaded and shared on the Internet without consent, invading privacy and destroying lives.

Debian Security

Debian Security Advisories.

AI Doppelgangers Cyber Crime

AI scams are on the rise and are beginning to impersonate legitimate identities to scam unsuspecting internet users a new cyber crime.

Linux Security Hybrid

Linux Security Hybrid The central voice for Linux and Open-Source security news.

Cyber Threats to Australia

Cyber security one of the biggest threats to Australiaā€™s defence and businesses.

Data Matters In Cybersecurity

Cybersecurity, Privacy, Data Protection, Internet Law and Policy.

Is The US-China Trade War Causing a Digital Iron Curtain?

The deepening trade war between the US and China has threatened to divide the world into two economic and technological blocs.
Share Websitecyber